Apple has launched a new privacy portal that details the company's security and privacy tools and allows users to download a copy of their personal data.
A new SaaS firm is working to automate the security and operational aspects of cloud computing to take the burden off enterprises.
In this Straight Talk with Real CISOs video for Decipher, Wendy Nather (director of Advisory CISOs at Duo), Chad Loder (CEO and co-founder of Habitu8), and Manju Mude ("Paranoid" Security Leader at Oath) swap stories about their CISO days and the importance of empathy in security.
Apple, Cisco, Mozilla, and other tech providers say a proposed law in Australia to force backdoors in encrypted services would weaken security for everyone.
Cisco Talos researchers have discovered an Android trojan called GPlayed that mimics the Google Play store and can morph once it's installed.
The main point of using a personal VPN is to surf the interwebs in privacy, away from prying eyes. Lock down the browser before starting up the personal VPN for maximum benefits.
Personal VPNs have a lot of expectations, and they aren't suited for all of them. But there are some scenarios that are ideal for personal VPNs.
Senators and law enforcement officials warned that cyberattacks by foreign adversaries are reaching a critical point.
People expect the personal VPN to hide or otherwise obscure what they are doing on the Internet. Some are better than others, but it is difficult to evaluate them on technical merits. Duo Labs provides guidelines on how to pick a personal VPN that matches your threat model.
In a small update to iOS, Apple has fixed two bugs that allowed someone to bypass the passcode on a locked iPhone.
The Solo security keys are based on open-source software and hardware designs and work with both desktop and mobile devices for two-factor authentication.
Thank you California. Gov. Brown has signed into the law that requires manufacturers to give Internet-connected devices unique passwords and not weak passowords like "admin" by default.
Whether or not Chinese spies actually planted rogue chips into Super Micro servers, this kind of supply chain attack is feasible. This is just the tip of the iceberg.
Two Russian-speaking APT teams recently have been seen using shared code and targeting the same organizations.
Creating static profiles of APT groups has limited value as tactics and tools shift constantly. So some researchers are advocating a move to dynamic profiles of adversaries.