Security News

Almost 70% of companies have cybersecurity best practice guidelines in place but neglect to take the necessary steps to secure their business. A staggering 44% of businesses admitted to not...

Only 28% of gov.uk domains have been proactive in setting up DMARC appropriately, in line with UK Government Digital Service (GDS) advice in preparation for the retirement of the Government Secure...

According to the EU’s net neutrality regulation, called the Open Internet Regulation, which came into force in 2016, internet providers should treat all internet traffic to and from their...

The acquisition of clear and express consent to process personal data under the GDPR will be a priority for all organizations starting May 25, 2018. Here are some simple guidelines.

Late last week, the US Customs and Border Protection agency released an update to its Directive governing Border Searches of Electronic Devices. According to the new directive, which supersedes...

Some Experts Question Whether a Voluntary Approach Is Strong EnoughA new House bill proposes that federal regulators work with healthcare providers and insurers as well as technology firms to...

Instituting a vulnerability disclosure program (aka bug bounty program) that won’t blow up in the organization’s face can be a daunting task. Some will prefer to enlist outside experts to advise...

NIST's latest password guidelines focus less on length and complexity of secrets and more on other measures such as 2FA, throttling, and blacklists.


Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found: "Internet of Things (IoT) Broadband Internet Technical Advisory Group, Broadband Internet...