October 03, 2019
How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters? Read more â¶
Business email compromise attacks cost millions, losses doubling each year
How to create an effective security policy (and 4 templates to get you started)
How to protect and safely erase data on Windows devices
5 trends shaking up multi-factor authentication
Voting machine security: What to look for and what to look out for
Top cybersecurity masters degrees: Which is right for you?
Learn more about how to embrace a risk-adaptive approach to data protection. Read more â¶
Cybercriminals follow the money, and you need look no further than Toyota Boshoku's recent $37 million loss to see why many are turning to BEC scams. Read more â¶
DEALPOST
Read more â¶
Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response. Read more â¶
Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives. Read more â¶
Universal adoption of multi-factor authentication (MFA) is hindered by technical limitations and user resistance, but its use is growing. Here's why. Read more â¶
The US Senate approved $250 million to help states purchase more secure voting equipment â but includes no provisions for what "secure" means. Our buying guide will help state election officials spend taxpayer money wisely. Read more â¶
New cyber masters degrees are popping up all over the place. Here's our unscientific rundown of the top five. Read more â¶
How secure is your cloud data? Read more â¶