Securing cloud providers’ SSO
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Economics. Eschatology. Infosec.
95 articles
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Cybersecurity trends to consider and new threats to protect against in 2024.
Researchers used a hardware hack to bypass Windows Hello biometric authentication on three different devices. Can you trust this login method?
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
A look at the pros and cons of updating Android — and ways to do it safely.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Detailed tips for those who want to make money from streaming without feeding the trolls.
What caused a mass vulnerability in VPN clients, and how to keep them working.
What settings do you need to clear before getting rid of a gadget?
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?