A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.
The EU's General Data Protection Regulation is now a year old, and has resulted in financial repercussions and changes to how businesses handle data.
Bot and phishing attacks can compromise your G Suite account, but there is an easy way to block the majority of these attempts, according to Google.
There have been some major security breaches in recent years, according to a recent Bitglass report, and those breaches have cost companies billions of dollars along the way.
TechRepublic took home multiple awards at the national 2019 Azbee Awards of Excellence, including two gold awards and honorable mention for Website of the Year.
Improper handling of a custom URI created a vulnerability, now patched, for users of the Electron-based Slack Desktop client on Windows.
Businesses across industries lose money and reputation due to knock-off products and questionably sourced materials, but a solution may already exist, according to a Cisco and BCG report.
Hyper-Threading, Intel's implementation of symmetric multithreading (SMT) can be exploited using the newly-disclosed MDS vulnerabilities, like Fallout and ZombieLoad.
If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field.
Staying up to date on Spectre and Meltdown can be challenging. This guide includes in-depth explanations about these uniquely dangerous security vulnerabilities and the best mitigation solutions.
Microarchitectural Data Sampling are CPU side-channel vulnerabilities that allow attackers to view in-flight data from CPU-internal buffers. Learn more about MDS attacks in this comprehensive guide.
This week's TechRepublic and ZDNet news stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal, and a look at the highest paying internships for 2019.
A major gap exists between the perception and reality of online security safety, according to Google Registry and The Harris Poll.
Medical IoT devices carry significant cybersecurity risks, according to a Forescout report.
Security professionals are willing to share intel with their peers and the government if such sharing improved their ability to detect cyber threats, according to an IronNet survey.