Shutterstock with padlock

5 Top Cybersecurity and DevOps Trends for 2020

As we head into 2020, it’s clear that nothing much has changed in the…


Telephone with stretched out tentacles

Why Phone Numbers Stink As Identity Proof

Phone numbers stink for security and authentication.  How exactly did we get to…


Hands with cuffs

Mind your own business! CEOs who misuse data could end up in jail

CEOs who lie about misusing consumers’ data could face up to 20 years in jail…


Red panel with a virus

Russian state hackers rarely share code with one another

virusA first-of-its-kind research project highlights the connections between…


Man interacting with a panel

Hackers Selling Business, Customer Data at Bargain Prices

Businesses should understand that identity theft impacts both their customers…


Collage of images on technological objects

These are the Internet of Things devices that are most targeted by hackers

Internet-connected security cameras account for almost half of the Internet of…


Mark Begor talking into the microphone

Equifax became the first company to have its outlook downgraded for a cyber attack

Moody's has just slashed its rating outlook on Equifax, the first time…


Robby Mook speaks to the traveling media corps.

FEC approves free cybersecurity for campaigns despite influence concerns

The Federal Election Commission gave the go-ahead this week to a nonprofit…


A man with his face resting on the computer keyboard

How to Avoid Cybersecurity Fatigue

Many organizations struggle to manage cybersecurity threats. This may be due to…