Building a Remote Working Environment

How to build a cloud-only business based on three core security pillars — written at the start of the pandemic when businesses had days to make the switch.

Read article →

Phishing Detection and Response Basics

Are SPF, DKIM, and DMARC enough? A deep dive into secure email delivery and what organizations are still getting wrong.

Read article →

Cloud Services You May Be Overlooking

Companies moving workloads to the cloud often do so with a monolithic mindset. Here's what they're missing and how modern cloud architectures reduce risk.

Read article →

Patch Tuesday, March 2024 Edition

Apple zero-days, Microsoft memory safety commitments, and Google's secure-by-design push — a busy month for security patches.

Read article →

Mozilla Drops Onerep After CEO Admits to Running People-Search Networks

The nonprofit behind Firefox ends a new partnership with an identity protection service after its CEO's data-broker past comes to light.

Read article →

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files

The Kimsuky threat actor moves to CHM files as malware delivery vectors — what it means and how to defend against it.

Read article →