The means by which hackers access user information have quickly evolved beyond traditional phishing emails. Phishing has always had the…
Browsing: Security Awareness
At this point, everybody knows phishing is a threat. But then, it’s difficult to deny. As Verizon points out, over…
What is an Insider Threat? According to US-Cert.gov, an Insider Threat is a current or former employee, contractor, or other…
A ‘keep everything’ culture puts most businesses at risk of non-compliance with upcoming legislation As the impending GDPR deadline looms,…
‘User Risk Report’ finds distinct differences in personal security habits and vulnerabilities among international respondents PITTSBURGH – Wombat Security Technologies (Wombat), the…
High-Tech Bridge, a leading provider of web and mobile application security testing services and a “ Gartner Cool Vendor 2017” and…
Although the majority of industrial organisations believe they are well-prepared for cybersecurity incidents, this confidence may be not well-founded: every…
Meet High-Tech Bridge’s application security experts on stand S-48 at Infosecurity Europe The latest trends and insights on mobile and IoT…
Media outlets are today reporting: The leaked NSA report shows 2-factor authentication has a critical weakness: You (preceding links the Mashable story). IT security…
Sunnyvale, CA – Druva, the leader in cloud data protection and information management, today announced that it has joined the Cloud…