Skip to content

Secure Your Digital Life

  • Home
  • Data Protection

Category: Data Protection

  • Home
  • Data Protection
  • Page 48
Data Protection

4 big mistakes you’re probably still making in vulnerability management…and how to fix them

Let’s be honest folks, vulnerability management isn’t the same game it was five years ago. But if you’re still running periodic scans, ‘offering’ updates vs

Read More
Data Protection

8 ways to protect your privacy on Linux and keep your data safe

Elyse Betters Picaro / ZDNET Linux and privacy go hand in hand.  Also: I’m a Linux power user, and this distro made me rethink what an

Read More
Data Protection

Cisco takes aim at AI security at RSAC with ServiceNow partnership

Cisco and ServiceNow have kicked off RSAC Conference 2025 in San Francisco by announcing a new aspect of their seven-year collaboration. It brings together the

Read More
Data Protection

FBI Asks for Help Tracking Chinese Salt Typhoon Actors

The FBI has appealed to the public for information which might help it to unmask the threat actors behind a notorious Chinese APT group. Salt

Read More
Data Protection

Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even small weaknesses can escalate into

Read More
Data Protection

Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show

What is also clear from the documents is that US police are aware of the control corporations have over their ability to acquire vehicle location

Read More
Data Protection

ISACA Highlights Critical Lack of Quantum Threat Mitigation Strategies

Most organizations have no defined strategy to defend against quantum-enabled threats, according to a new survey by ISACA. Just 5% of IT professionals said such

Read More
Data Protection

How to Negotiate Your NIS2 Fine or Completely Avoid the Risk

Being a large or medium organization offering services like healthcare, public administration, transportation, energy, water or other utilities, finance, waste management, etc. means you must

Read More
Data Protection

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced persistent threat (APT) group called

Read More
Data Protection

IT-Security ist keine Vertrauenssache | CSO Online

„IT und IT-Sicherheit sind zwei eigenständige Disziplinen“, erklärt Andreas Lüning, Gründer und Vorstand der G DATA CyberDefense AG. „Wer sie in der Praxis gleichsetzt, unterschätzt

Read More

Posts pagination

Previous 1 … 47 48 49 … 201 Next
  • Fake AI video generators drop new Noodlophile infostealer malware
  • Microsoft Teams will soon block screen capture during meetings
  • What Is CaaS (Containers-as-a-Service)?
  • Where To Watch Why Women Kill for Free (Seasons 1 & 2) in 2025
  • Your Android phone is getting a new security secret weapon – and it’s a big deal
All Rights Reserved 2026.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.