Laden...
The day's top cybersecurity news and in-depth coverage
August 20, 2020
Despite safeguards in TLS 1.3, China is still censoring HTTPS communications, according to a new report. There are workarounds to this. Plus, how TLS can be used as an attack vector. Read more â¶
Even before he COVID-19 pandemic struck, cloud computing was among the top priorities for organizations.
A self-assessment of the company's security posture revealed a need to replace legacy tools with cloud-based, automated solutions.
Pentesting is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.
No one needs more stats about the skills gap in cybersecurity; many organizations are obviously facing challenges in recruiting, skilling, and retaining security professionals.
Not all cybersecurity awareness training vendors are the same or are right for your organization. Here's how to find the best match.
Windows 10 provides a few options including Autopilot and AppLocker to securely and remotely deploy Windows devices and harden them against attack.
Looking for a better endpoint protection platform to protect remote staff working on Windows PCs, Macs, smartphones or even Linux? One of these might be the answer.
© 2025