From Whatsapp, to Apple's iPhone encryption, law enforcement has always looked for back-doors to access protected user data. The industry's stand? With the users, always.
Infrastructure attacks have been escalating over the last year, from the standard intrusion to grid networks to March's attack on Atlanta's basic services.
Lay-off procedures are more than just awkward situations, they can also be a risk to your company's secrecy and data infrastructure.
We've hit three decades of Got(IT)! Well, ok, thirty posts, not years, but we will get there!
This week we talk about a password-less future! What's your password-killer choice? Biometrics, physical keys, or another one?
This week we're looking at new threats and security changes that could soon become day-to-day issues!
A week of warnings! This time we have a recap full of flaws, exploits, and malware, so keep your eyes open and see what could affect your network.
This week we steer clear from this year's tendencies and we start to look into new flaws and targets!
New day of the week for GOT(IT), but this year's security topics still feel like a spy vs spy strip!
2018's top cyber-threat tendencies are living up to their name: state-sponsored attacks and cryptojacking continues on the rise