Microsoft Edge Could Make Zero-Day Bugs a Thing of the Past
| | | | | | | | | | | | | | | | | | |

Microsoft Edge Could Make Zero-Day Bugs a Thing of the Past

With web browsers increasingly becoming the first (and for some, perhaps the only) app most of us use, Microsoft is taking steps to harden it against … See all articles in Insights

Employee surveillance is exploding with remote work—and could be the new norm
| | | | | | | | | | | | | | | | | |

Employee surveillance is exploding with remote work—and could be the new norm

At the start of the pandemic in 2020, as office workers began toiling remotely on company laptops, many of their employers secretly followed, sending … See all articles in Insights

How to implement network segmentation for better security
| | | | | | | | | | | | | | | | | | | |

How to implement network segmentation for better security

For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each … See all articles in Insights

End Users Remain Organizations’ Biggest Security Risk
| | | | | | | | | | | | | | | | | | |

End Users Remain Organizations’ Biggest Security Risk

Yet they’re showing signs of improvement across several important areas, a Dark Reading survey reveals. See all articles in Insights

Apple’s Safari browser isn’t as secure as you think — new bug lets websites unveil your identity
| | | | | | | | | | | | | | | | | |

Apple’s Safari browser isn’t as secure as you think — new bug lets websites unveil your identity

Apple’s catchphrase for Safari, the Cupertino-based tech giant’s default browser, is “Blazing Fast. Incredibly Private.” We can’t contest the former, … See all articles in Insights

Cybersecurity labels for consumer products could be on the way
| | | | | | | | | | | | | | | | | | |

Cybersecurity labels for consumer products could be on the way

It’s a big challenge because most consumers only have a foggy understanding about which products are most secure against hacking. Even if they understood better, experts fear security would still rank far lower in buying decisions than factors like price and features. The big plan from Commerce’s … See all articles in Insights

Beware the QR code scams
| | | | | | | | | | | | | | | | | | |

Beware the QR code scams

QR code scams are growing. Here’s what to look out for. By now, most internet users know the usual scams to look out for: Phishing emails trying to steal your account logins, misspelled URLs attempting to access your bank accounts, fake online storefronts charging you for products they never intend … See all articles in Insights

What Is Data Visualization? | Benefits, Types & Best Practices
| | | | | | | | | | | | | | | | |

What Is Data Visualization? | Benefits, Types & Best Practices

At the core of digital transformation lies data democratization, the practice of making data accessible throughout all departments of a business, not … See all articles in Insights

The future of security protocols for remote work – Help Net Security
| | | | | | | | | | | | | | | | | | |

The future of security protocols for remote work – Help Net Security

Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing … See all articles in Insights

The importance of sandboxing for SMBs
| | | | | | | | | | | | | | | | | | |

The importance of sandboxing for SMBs

When the pandemic first struck and countries across the globe went into lockdown, governments, businesses and communities were forced to completely … See all articles in Insights