The Security Pros and Cons of Using Email Aliases

The Security Pros and Cons of Using Email Aliases

One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a "+" character after the username ...
Microsoft Patch Tuesday, July 2022 Edition

Microsoft Patch Tuesday, July 2022 Edition

Microsoft today released updates to fix at least 86 security vulnerabilities in its Windows operating systems and other software, including a weakness in all supported versions of Windows that Microsoft warns is ...
Your Phone May Soon Replace Many of Your Passwords

Your Phone May Soon Replace Many of Your Passwords

Apple, Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to ...
You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results

You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results

Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number, email address or ...
Microsoft Patch Tuesday, April 2022 Edition

Microsoft Patch Tuesday, April 2022 Edition

Microsoft on Tuesday released updates to fix roughly 120 security vulnerabilities in its Windows operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and ...
AI ML Darktrace Concentric supply chain Palo Alto AI partnership ai

Creating a Partnership with Your AI Cybersecurity Tools

There are a lot of reasons why humans need AI’s help in cybersecurity. The skills shortage is one. Handling the monotonous tasks that lead to burnout is another. The ability to do ...
Security Boulevard
Microsoft Patch Tuesday, November 2021 Edition

Microsoft Patch Tuesday, November 2021 Edition

Microsoft Corp. today released updates to quash at least 55 security bugs in its Windows operating systems and other software. Two of the patches address vulnerabilities that are already being used in ...
The Rise of One-Time Password Interception Bots

The Rise of One-Time Password Interception Bots

In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords. That service ...
Does Your Organization Have a Security.txt File?

Does Your Organization Have a Security.txt File?

It happens all the time: Organizations get hacked because there isn't an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn't entirely ...

How Did the Cybersecurity Ecosystem Get So Clogged Up?

Today’s enterprise operations involve the coordination of several different digital ecosystems but none quite so inflamed as the cybersecurity ecosystem. Technology has been evolving at a rapid pace, and attackers are armed ...