DEF CON 26 is over, but more questions than answers remain. After all we've seen, are electronic voting machines really the best and safest way to cast our votes?
Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.
External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education.
In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.
If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.
GitHub is being acquired by Microsoft. Is it time for developers to panic and export their repositories to another product or can Microsoft be trusted?
So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...
To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users...
Healthcare companies in the US have had to protect sensitive personal data for a long time under HIPAA. But are healthcare companies on the hook in light of the GDPR?
The FCC’s repeal of net neutrality takes effect today (Monday, April 23rd) and it means a lot to all of us.