The cloud has become the most dominant computing platform in the world. And with business moving their data to it in increasing numbers, many wonder if this means the end of the data center.
Safari 15 implements the IndexedDB API, which introduces a data leak that allows websites to track the user’s internet activity and disclose their identity. FingerprintJS reported […]
Many companies use cloud apps like Microsoft 365, Google G Suite, and Salesforce without adequately protecting the data within those apps. Learn why this is problematic […]
What happens when a data leak or data breach occurs? Even the largest organizations are susceptible to them. We take a look at what they are, how hey happen, and how you can prevent them in our latest blog post.
Quick Response (QR) codes have become a standard method of conducting contactless transactions during the COVID-19 pandemic. However, cyber criminals are exploiting the lax security that […]
Have you heard of Zero Trust network security strategies? They represent the cutting-edge of internal network security. If your IT strategy doesn't include a Zero Trust strategy you might not be fully protected.
Cybercriminals have recently increased their use of banking trojans, which continue to become more effective as they evolve. For example, Brazilian Remote Access Tool Android (BRATA) […]