Businesses Struggle with Cloud Availability as Attackers Take Aim

Researchers find organizations struggle with availability for cloud applications as government officials warn of cloud-focused cyberattacks. The majority of organizations have separate tools for networking and security, researchers report in a new survey on cloud and networking challenges. Their findings emerge as US government officials warn businesses of successful attacks

0 Comments

These Kids Are All Right

Faculty and students at the William E. Doar School for the Performing Arts in Washington, D.C. created “Cyberspace,” a rap song about online safety as part of the NSA’s national STOP. THINK. CONNECT. campaign back in 2012. Wonder how many went into security. [embedded content] Source: StaySafeOnline.org What security-related videos have

0 Comments

CES 2021: Router swarms invade your home (and know where you are)

New mesh Wi-Fi routers may be the answer to your wireless signal woes, but how about your privacy and security? Wi-Fi is hard, especially powering the swarms of smart devices in the average home. To combat dead spots, metal surfaces which block or reflect signals, and distant garages too far

0 Comments

Apple Removes macOS Feature That Allowed Apps to Bypass Firewall Security

Apple has removed a controversial feature from its macOS operating system that allowed the company’s own first-party apps to bypass content filters, VPNs, and third-party firewalls. Called “ContentFilterExclusionList,” it included a list of as many as 50 Apple apps like iCloud, Maps, Music, FaceTime, HomeKit, the App Store, and its

0 Comments

Why cyberinsurance can save your business

The threat of loss of an entire company from a cyberattack is real. Technology and user education help, but not enough. Image: iStock/dpVUE.images Cyberattacks are damaging businesses all over the world, and some are going as far as to shut down in their wakes, leaving employees without jobs. On TechRepublic’s

0 Comments

How to Achieve Collaboration Tool Compliance

Organizations must fully understand the regulatory guidance on collaboration security and privacy so they can continue to implement and expand their use of tools such as Zoom and Teams. As “work from anywhere” continues its ascent because of the pandemic, the use of collaboration tools such as Zoom, Cisco Webex,

0 Comments

Name That Toon: Before I Go …

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. New year, new … yeah, whatever. Perhaps The Edge’s first cartoon caption contest of 2021 can distract you from matters large and small. We can only hope

0 Comments

Why cybersecurity audits are essential for risk management

Find out what your company could risk by not getting cybersecurity audits. Image: Getty Images/iStockphoto TechRepublic contributing writer Lance Whitney reported in December 2020 that security firm McAfee estimated that cybercrime would cost the world $1 trillion last year. When it comes to cybersecurity, it’s difficult to improve anything if

0 Comments

Microsoft Implements Windows Zerologon Flaw ‘Enforcement Mode’

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

What’s your attitude to parental controls?

Nobody said parenting was easy, but in the digital age it comes with a whole slew of new challenges. How do parents view the role of parental monitoring in children’s online safety? Experience from my nearly 20 years of being involved in the conversation around child online safety has caused

0 Comments