CISA’s recommendations to recognize and avoid email scams [E-book]

CISA’s recommendations to recognize and avoid email scams [E-book]

Email has always been a popular tool for business communications. Unfortunately, it is also one of the weakest links in an organization’s security strategy. 94 percent of all cybersecurity incidents originate from ...
IoT

Congress Passes IoT Security Act, but is it Toothless?

The House and the Senate have both passed a bipartisan bill to shore up the security of “internet of things” devices ...
Security Boulevard
Check, Please! Adding up the Costs of a Financial Data Breach

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become ...
Why achieving iO -- 'indistinguishability obfuscation' -- is so crucial by Byron Acohido

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

Most of time we take for granted the degree to which fundamental components of civilization are steeped in mathematics.Everything from science and engineering to poetry and music rely on numeric calculations. Albert ...
cybersecurity

The Art of Storytelling in Cybersecurity

This episode of the “CyberHero Adventures: Defenders of the Digital Universe” show focuses on answering the question, How do you use stories to distill complicated cybersecurity information into digestible bites? Our guests ...
Security Boulevard

Embracing SaaS Productivity Without Sacrificing Security

We are living in very interesting times. Organizations of all sizes and across all industries have been migrating to the cloud for years. Those that were not already actively engaged in digital ...

Protecting Digital Democracy

With Election Day over, Americans await the final vote counts. As this contentious race coming to a close, securing digital data is now more critical to the democratic process than ever before ...

Tackling the Cybersecurity Resource Problem

Cybersecurity has always been important, but in today’s completely-digital world, it may be safe to say that it matters even more. As the digital footprint and connectivity increases, so do the security ...

Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms

The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...
The mainstreaming of biometrics-enabled access by Byron Acohido

SHARED INTEL: Coming soon — ‘passwordless authentication’ as a de facto security practice

As a tradeoff for enjoying our digital lives, we’ve learned to live with password overload and even tolerate two-factor authentication.But now, at long last, we’re on the brink of eliminating passwords altogether, ...