Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface. In May 2020, Björn Ruytenberg, a computer security researcher at the Eindhoven University of Technology in the Netherlands, announced the discovery of Thunderspy, a series of vulnerabilities in the Thunderbolt technology and interrelated scenarios for changing – including disabling – … More Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

Positioning your cybersecurity investment for a remote workforce: Tier 3 – Tailor-fit protection for specific business use cases

With a managed network in place in tier two, a lot has been done to secure your endpoints from attack. However, some businesses will need to assess whether the protection that has been achieved thus far is adequate to safeguard business data that has critical value, or is highly sensitive or highly regulated. In the third … More Positioning your cybersecurity investment for a remote workforce: Tier 3 – Tailor-fit protection for specific business use cases

How encryption can help protect your sensitive data

Here’s how encryption can help keep your data safe from prying eyes – even if your device is stolen or your cloud account is hacked. You probably store all kinds of sensitive information on your personal computer – or your smartphone, for that matter. For good measure, you may even store your data in the … More How encryption can help protect your sensitive data