7 Ways VPNs Can Turn from Ally to Threat

VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.

HP Purchases Security Startup Bromium

The purchase will bring new isolation and threat intelligence capabilities to the HP portfolio.

Ransomware Strikes 49 School Districts & Colleges in 2019

The education sector has seen 10 new victims in the past nine days alone, underscoring a consistent trend throughout 2019.

WeWork’s Wi-Fi Exposed Files, Credentials, Emails

For years, sensitive documents and corporate data have been easily viewable on the coworking space's open network.

A Safer IoT Future Must Be a Joint Effort

A Safer IoT Future Must Be a Joint Effort

Change these 4 new security settings in iOS 13 now

If you’ve (successfully) upgraded to iOS 13 or just got hold of a new iPhone 11 or 11 Pro, there are new security settings in Apple’s latest operating system you need to learn and use. Here's what's important to understand.

Fight back against robocalls

There were 26.3 billion robocalls in the U.S. in 2018. It’s a a sickness.

You can stop the contagion thanks to a new in iOS 13 feature that directs incoming calls from unknown numbers (ie. those you don’t have in your Contacts book) to voicemail. It’s a useful feature that isn’t enabled by default.

To read this article in full, please click here

Now change these 4 new security settings in iOS 13

If you’ve (successfully) upgraded to iOS 13 or just got hold of an iPhone 11 device, here are the new security settings inside Apple’s new operating system you need to learn and use.

Fight back against robocalls

There were 26.3 billion robocalls in the U.S. in 2018. It’s a a sickness.

You can stop the contagion thanks to a new in iOS 13 feature that directs incoming calls from unknown numbers (ie. Those you don’t have in your Contacts book) to voicemail.

It’s a useful feature that isn’t enabled by default.

To read this article in full, please click here

A Beginner’s Guide to Microsegmentation

In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture.

Lion Air the Latest to Get Tripped Up by Misconfigured AWS S3

The breach, which reportedly exposed data on millions of passengers, is one of many that have resulted from organizations leaving data publicly accessible in cloud storage buckets.