by Beck Bailey | Jul 25, 2023 | RSS
As the number of people using macOS keeps going up, so does the desire of hackers to take advantage of flaws in Apple’s operating system. What Are the Rising Threats to macOS? There is a common misconception among macOS fans that Apple devices are immune to...
by Beck Bailey | Jul 25, 2023 | RSS
Want a custom security dashboard to bring together data from multiple places? Microsoft Power BI can do that and help you spot what’s changing.
by Beck Bailey | Jul 25, 2023 | RSS
A set of five security vulnerabilities have been disclosed in the Terrestrial Trunked Radio (TETRA) standard for radio communication used widely by government entities and critical infrastructure sectors, including what’s believed to be an intentional backdoor...
by Beck Bailey | Jul 25, 2023 | RSS
How do you overcome today’s talent gap in cybersecurity? This is a crucial issue — particularly when you find executive leadership or the board asking pointed questions about your security team’s ability to defend the organization against new and current...
by Beck Bailey | Jul 25, 2023 | RSS
A new security vulnerability has been discovered in AMD’s Zen 2 architecture-based processors that could be exploited to extract sensitive data such as encryption keys and passwords. Discovered by Google Project Zero researcher Tavis Ormandy, the flaw –...
Recent Comments