Fortinet researcher discovers new crypto-mining malware exploiting Windows machines
Security Pros Support Data Collection Regulations
A survey taken at RSA reveals unexpected results about data collection, digital privacy and backdoors
How-To: Add Timing-Allow-Origin Header to Improve Your Website Performance Measurements
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
UK SMBs Urged to Test Cyber-Resilience
New Would You Be Ready? Campaign is backed by NCSC
#BSidesScot: Understand the Move from Consultant to Client
Doing security is easy, but there can be some specific challenges in a large corporate company
Introducing the New, Refined NIST Version 1.1
NIST hosts public webinar to explain updates in latest version of frameworks
Privacy International Files ICO Complaint Over Secret Police Data Downloads
UK cops’ mobile phone extraction practices contravene GDPR, warns rights group
EMEA Ransomware Attacks Soared Last Year
NTT Security finds sharp difference between global and regional threat landscape
Alexa Turned Spy, Able to Snoop on Users
Design flaw in Alexa allows researchers to transform device from personal assistant to spy
Fight to Get SMBs PCI Compliant a Losing Battle
Senior executives at global acquiring
organizations feel smaller merchants are not doing enough to be PCI DSS compliant