Facebook stored hundreds of millions of passwords in Plain Text

When handing over our personal data, there is an expectation of security and privacy. When corporations betray that trust, how should we respond?
When handing over our personal data, there is an expectation of security and privacy. When corporations betray that trust, how should we respond?
The convenience of networked printers and scanners is impossible to deny. Of course, it's easy to forget that any device available to legitimate users on a network can also become a backdoor for attackers.
According to a new study, the frequency and cost of data breaches in the US are on a steady increase, with finance and healthcare sectors proving to be the biggest targets.
This week, 16 major vulnerabilities were found in Microsoft's Remote Desktop Protocol clients.
The United States Computer Emergency Readiness Team released alert TA17-156A regarding the abuse of SNMP.
Marriott joins the growing list of corporations who have failed to protect their customer's data - what are you doing to avoid the same fate?
Employers, take notice: the Supreme Court of Pennsylvania has ruled that businesses are responsible for protecting their employees’ sensitive data.
A system is only as strong as its weakest component. In IT security, that’s often the people operating it.
The cybersecurity ecosystem is constantly changing. It's time to take a proactive approach to securing your company's systems.
Running third-party code on your web application? Keep your customers' data secure through the use of Subresource Integrity.
Access your free trial today and see what CyberSana can do for your enterprise.