RSA 2016 will host a record number of 30,000 attendees at more than 400 sessions, keynotes, peer-to-peer sessions, track sessions, tutorials and seminars, which will feature 500+ speakers.
A strong and unique password is a necessary component to Internet security.
Checking for vulnerabilities is a challenge for many, but that doesn’t mean it’s not possible. See these three tips for making vulnerability scanners work better for your IT team.
Only 35% of SMTP server have configured encryption protocols correctly. Low adoption rates of encryption and authentication and improper configuration can lead to a STRIPTLS attack.
Short-lived certificates are a new innovation that can be used to extend TLS protections to a greater number of users.
The “high” and “low” severity vulnerabilities in OpenSSL do not affect SSL Certificates, but patch your OpenSSL framework as soon as possible.
The FBI stated that businesses worldwide have lost more than $1.2 billion to whaling attacks.
As smart devices find their place in the majority of modern homes, users must begin taking an active approach in protecting themselves and their homes from potential security breaches.
They’re your most frequently used devices, but they’re also the most frequently hacked devices. Learn what you can do to decrease the security risks on your devices.