Trends

Amazon Alexa Skills Present Security Risks

Alexa skills are growing in popularity as users look to extend the capabilities of their Alexa devices. Researchers now believe that the rapid adoption...

Passwordless Authentication 101

Although they are the most common tool used to verify a person's identity, passwords are the least secure mode of authentication. They can be...

Best Password Management Software & Tools

Everyone has a seemingly endless number of accounts that require login credentials. This creates a lot of opportunities for hackers to gain access to...

Cybersecurity Employment Outlook 2021

The massive SolarWinds breach drove home the point that the cybersecurity threat only gets worse with time, the stakes higher - and the tools...

Apple White Hat Hack Shows Value of Pen Testers

    The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of...

Employees and Data Backup Top Cybersecurity Awareness Month Concerns

    October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain, it's only fitting that this year's theme...

Remote Work Security: Priorities & Projects

Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list...

Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

Foster City, CA, Feb. 06, 2019 -- eSecurityPlanet.com, a top online resource for IT...

10 Vendors Making News at Black Hat USA 2018

The core of the Black Hat USA conference is security research, but in recent years it has also become a chance for...

Top 10 Talks to See at Black Hat USA 2018

The Black Hat USA security conference has an allure unlike no other cybersecurity...

Latest articles