3 Best Practices to Avoid Inevitable Ransomware Attacks

Tips to mitigate and protect against the ongoing threats of ransomware By Jesper Zerlang, CEO, LogPoint…

Can Your Cybersecurity Culture Stand Up to the Latest Spear Phishing Techniques?

By Josh Yavor, Chief Information Security Officer, Tessian Gone are the days of bulk spear phishing…

The Package Analysis Project: Scalable detection of malicious open source packages

Posted by Caleb Brown, Open Source Security Team  Despite open source software’s essential role in all…

Why MFA Alone Isn’t Enough for True Cybersecurity

By Bojan Simic, Co-Founder, Interim CEO & CTO, HYPR Multi-factor authentication (MFA) was once a foreign…

Smarter Homes & Gardens: Smart Speaker Privacy

So is your smart speaker really listening in on your conversations?  That’s the crux of a…

How we fought bad apps and developers in 2021

Posted by Steve Kafka and Khawaja Shams, Android Security and Privacy Team Providing a safe experience…

How Covid-19 Changed Advertising Forever

By Bernie Brode, product researcher at Microscopic Machines There has been much written about how the…

KB4-CON 2022: Awareness, Behavior and Culture: Trip Report

After two years of virtual events, I was thrilled to attend KB4-CON 2022, run by KnowBe4,…

Cyber Crime Is on The Rise and These Experts Have the Knowledge You Need

By Jon Clemenson, Director of Information Security, TokenEx Nearly every day, there’s news about another major…

9 Ways Social Media Sabotages Your Cybersecurity

By Alex Lysak, CEO of Scanteam Social media has become one of the most common ways…