Analyses

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.
Mobile phone data privacy.

closeup of female hand holding red marker checking off list

5 things security pros want from XDR platforms

New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform.

A vast network of identity avatars. [identity management]

What is decentralized identity?

Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...

lion cub parent teaching child nature animal growl yawn

Take LAPSUS$ teens seriously

After the Okta breach, LAPSUS$ is already back making trouble using low-tech techniques with a high rate of success.

Load More