Why You Need a Chief Trust Officer

To address the challenge of digital risk, organizations need to look at creating the role of a Chief Trust Officer to help them navigate the risks of digital transformation ...

How You’re Tracked Online, New Mass Surveillance Concerns, Malicious Android App Hijack

In episode 98: A new report from the EFF details how we are tracked online by third-party corporations, more mass surveillance concerns in China and Australia, and a malicious app hijack attack ...
Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google Search

Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google

In episode 94 of our monthly show for November 2019: The 25 most dangerous vulnerabilities, the privacy of new “smart cities”, and which search engine keeps your searches more private? It’s DuckDuckGo ...
Apple privacy

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

Why is Apple so bad at answering simple questions? ...
Security Boulevard
Kristin Savage

How to Write Perfect Cyber Security Strategy for Your Venture

Protecting your company from online dangers is one of the most important things you need to take into consideration when it comes to running your own business. The threats you can come ...

11 Cybersecurity Predictions for 2020

It’s been another eventful year for cyber attacks. More than 4 billion records have been... The post 11 Cybersecurity Predictions for 2020 appeared first on Gurucul ...

The Bedrock of Security

Many organizations struggle with insecure access methods and unidentified processes. Integrating new, updated resources and technology can be an increasingly valuable commodity for any organization. But without building the foundation first, it ...
StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

Norwegian researchers find huge vulnerability in 80% of all Android phones. Hackers have been quietly exploiting “StrandHogg” for months–if not years ...
Security Boulevard
quantum computing

Quantum Computing Is Coming: Are You Cyber Ready?

We’ve been hearing about the vast potential of quantum computing for years. With its exponentially superior processing power, this game-changing technology is expected to dramatically transform fields such as medical sciences, machine ...
Security Boulevard
cybersecurity

Privacy Regs Changing the Face of Cybersecurity

Companies must take a different cybersecurity tack to ensure ongoing compliance with global regulations regarding privacy The regulatory climate around the world is changing rapidly. Scores of new regulations, including the General ...
Security Boulevard
Loading...