Google hikes payouts on Chrome bug-bounty program

In an attempt to make its products safer, Google is enticing the best and brightest with higher payouts in its…

17 hours ago

7 recent acquisitions in the IT security space — and why they happened

Companies that have proven cybersecurity tools and solutions are hot commodities, as these seven IT security acquisitions clearly show.

1 week ago

An IT pro’s guide to the most widely used IT frameworks and standards

It can be overwhelming for IT professionals to find the frameworks and standards best suited for their company’s needs. That’s…

1 week ago

Prepare for the inevitable: Incident response plan to phishing attacks

Phishing attacks are on the rise, and every business is a prime target. Do you have an incident response plan…

2 weeks ago

Identity and access management best practices to keep your data safe

What are some best practices when you want to implement an identity and access management solution to safeguard your company’s…

2 weeks ago

Got kids? These 10 cybersafety tips will keep them more secure

IT pros know how hard it is to ward off online dangers. And if you’re a parent, the stakes are…

2 weeks ago

Silex — a malware created by teens — bricks IoT devices

A new malware dubbed Silex renders IoT devices useless — and it wasn’t created by experienced hackers. It was unleashed…

2 weeks ago

Secure databases in complex backend systems with these 5 best practices

Boosting cybersecurity often starts with secure databases. Here are a few best practices that can help you lock down your…

3 weeks ago

OSX/Linker: New zero-day malware targets Mac devices

The cloak of invulnerability Mac users feel protects them from malware is torn again. OSX/Linker is a zero-day that attacks…

3 weeks ago

Cisco issues critical patches for Data Center Network Manager

According to multiple security advisories from Cisco, two critical patches were released for vulnerabilities in the Data Center Network Manager.…

3 weeks ago