4 ways 5G will change your enterprise threat model

With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider…

6 mobile security threats you should take seriously in 2019

Mobile security is at the top of every company’s worry list these days — and for…

Best Android antivirus? The top 13 tools

The following are the 13 best antivirus tools for Android, according to AV-TEST’s September 2018 evaluations…

Facebook’s free VPN acts like spyware to iOS users in the U.S.

You would think that if a free VPN were being offered to the masses, then safeguarding…

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

CSO Online | Feb 12, 2018 Nathan Freitas, who heads The Guardian Project, talks with host…

4 must-know facts about secure mobile printing

When you think about mobile devices and security, printing probably isn’t the first thing that comes…

List of 200 cybersecurity startups that received venture capital in 2017

Cybersecurity Ventures predicts global spending on cybersecurity products and services will exceed $1 trillion cumulatively, from…

Best Android antivirus? The top 10 tools

The following are the 10 best antivirus tools for Android, according to AV-TEST’s November 2017 evaluations…

Meltdown and Spectre affect the smartphone in your pocket. Should you be worried?

The Spectre of broken silicon will haunt smartphone security for years to come. The Meltdown and…

The gift of digital safety

Many of us are still grappling with how we can best leverage all the new technology-driven…

Unraveling the truth about the NIST’s new password guidelines

Is “Xr6Tn$*35QK” really a bad password? A recent article in The Wall Street Journal might lead…