Confluence security review
Atlassian Confluence is a group collaborative writing tool. How Confluence performs against the SaaS...
Slack security review
Slack is a real-time messaging and file sharing application designed to aid group collaboration. ...
SaaS security principles
The table below lists each SaaS security principle, along with a brief description of its...
MailChimp security review
MailChimp is an email service provider which allows users to send automated messages, marketing...
SaaS security collection
Software as a Service (SaaS) applications are increasingly popular. Many of us use them on a daily...
G Suite security review
Google G Suite is a collection of productivity tools including spreadsheets, word processing and calendar....
Smartsheet security review
Smartsheet is an application for managing collaborative work. Creating projects and tasks, assigning these...
Google Tackles AI Principles: Is It Enough?
AI offers an immense capacity for good -- and for unintended consequences. ...
Facebook Software Bug Made Some Private Posts Public: 14 Million Affected
A Facebook glitch in May set millions of posts that users composed to...
GDPR: A Compliance Quagmire, for Now
Experts say the devil is in the details when it comes to complying...
Serve websites over HTTPS (always)
Securing websites, so they keep user data private, is an essential element of...
DNA Testing Service MyHeritage Leaks User Data of 92 Million Customers
An unspecified "private" server was found with the account data of users who...
Facebook Defends Against Device-Integrated APIs Policy
Facebook is again in hot water after an article alleged it struck deals...
Three random words or #thinkrandom
You're probably aware that there’s a lot of guidance out there on what...
Public Google Groups Leaking Sensitive Data at Thousands of Orgs
The exposed information includes accounts payable and invoice data, customer support emails, password-recovery...
Honda, Universal Music Group Expose Sensitive Data in Misconfig Blunders
The Honda mistake affects 50,000 users of the Honda Connect App, while UMG...
ICANN Launches GDPR Lawsuit to Clarify the Future of WHOIS
WHOIS, the searchable "phonebook" of contact data for internet domains, may violate GDPR...
Bug In Git Opens Developer Systems Up to Attack
A serious vulnerability was patched by developers behind Git that closes the door...
Fraudsters Claim To Hack Two Canadian Banks
Two Canadian banks reported that they may be targets of a hack after...
SEVered Attack Extracts the Memory of AMD-Encrypted VMs
Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that...
Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead...
Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to...
Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate
After an Alexa speaker recorded and shared a private conversation, the tech community...
What Will GDPR’s Impact Be On U.S. Consumer Privacy?
GDPR may be going in effect Friday, but U.S. citizens have a ways...
Of mice and cyber
What’s the difference between a combustion engine and a mouse? (no this isn't...
Ahead of GDPR, Information Governance Comes into Its Own
A full 98 percent of US enterprises have embarked on information governance (IG)...
Researchers Say More Spectre-Related CPU Flaws On Horizon
Yet another speculative execution side channel flaw has been disclosed in processors -...
Six Vulnerabilities Found in Dell EMC’s Disaster Recovery System, One Critical
A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a...
Intel Responds to Spectre-Like Flaw In CPUs
Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative...
Countdown to GDPR
Anybody who is involved in cyber security or data protection will be acutely...

