Google at loggerheads over support for journalism

Google at loggerheads over support for journalism

Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process. The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through…

woman in black long sleeve shirt using black laptop computer

Unwanted Voice Traffic: A Growing Threat Impacts Businesses

A new report shows the growing threat of unwanted voice traffic and its pervasive impact on enterprises worldwide.

group of people using laptop computer

Is the way we recruit exacerbating the skills shortage?

The shortage in cybersecurity experts has led businesses to compete in earnest over a small pool of talent and the consequences of this are that more cybersecurity professionals are changing jobs than ever.

Zero Trust Principles for Mid-Market Companies

The arena of Zero Trust is an unbridled circus. Conflicting best practices, classic overselling, and niche use cases abound making two things painfully clear: 1) organizational leadership is making Zero Trust a top priority, and 2) the folks tasked with implementing it have no idea where to start.

a person stacking coins on top of a table

Taking uncertainty out of cyber insurance

Cyber insurance is a difficult subject to get one’s head around. On the one hand, it is absolutely crucial to have that insurance in place before a company is hit with a successful cyber attack. On the other hand, getting

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

API Security: The New North, South, East and West of Cybersecurity

As security challenges shift to applications and focus on business process-oriented monitoring and protection around APIs, the terms North, South, East and West have new meaning, context and import.

Video Byte: Endpoint Protection

Our next video byte is up, discussing endpoint protection. That still sounds a lot like “Anti-Virus“ doesn’t it? But endpoint protection has come a long way from „only“ scanning for malicious software.

War, crime boost cryptocurrency regulation

An illegal war and a growing criminal use are driving efforts to regulate the unregulated cryptocurrency market.

scam bucket explains digital fraud

Scam Bucket: Ice Phishing

The most interesting scam we’ve found is brand new. It’s called “ice phishing” and it involves taking advantage of the disconnect between language and code.

What Is Pentesting? A Complete Overview

Everyone in cybersecurity and quite a few people beyond have probably heard about pentesting. But what is penetration testing really? This article has all the answers.

Consumer Cybersecurity: Watch for Miners

Consumers are facing cybersecurity threats on virtually every possible endpoint. A new report details the top cybersecurity threats that consumers faced in 2021.

All Eyes on Critical Infrastructure as Authorities Call for Greater Cyber Resilience

The recent ‘Five Eyes’ cybersecurity advisory underlines current concerns about the possibility of state-sponsored attacks. In particular, the guidance focuses on the risks faced by critical infrastructure providers.

Immersive education tech

There is no there in the Metaverse

The Metaverse is the decentralized web so you keep control of your data…. except for the corporations looking to make sure they control it before you figure it out. Nowhere is it being hyped more than for education. But for

Bridging the gap: International Women in Engineering Day

International Women in Engineering Day focuses attention on the many opportunities for women in engineering – as well as celebrating those paving the way.

Affordable training in abundance

The lack of security professionals isn’t because of a lack of affordable training