Get in Touch
Insider risk, supply chain vulnerability and vendor risk all boil down to the same thing: the more people have access to your data, the more vulnerable it is...
Since 1993, hackers have traveled to Las Vegas from around the world to demonstrate their skills at DefCon’s annual convention, and every year new horrors...
A misconfigured database has exposed the personal data of nearly every Ecuadorean citizen, including 6.7 million children.
The database was discovered by vpnMentor and was...
In the second episode of Third Certainty, Adam Levin explains how consumers can protect themselves in the aftermath of the Capital One data breach.
When Twitter CEO Jack Dorsey's account was hacked for roughly 20 minutes, we all got a glimpse of corporate identity theft, and why it...
A federal appellate court ruled that mining and aggregating user data publicly posted to social media sites is allowable by law.
In an opinion released...
Fifty attorneys general announced earlier this month that Google is the target of an antitrust probe. Any business owner who has happened to find themselves stuck in the...
The hacker allegedly behind the Collection #1 and Collection #2 data breaches has claimed responsibility for the compromise of more than 200 million users...
The FBI is warning businesses about a new series of cyberattacks that can circumvent multi-factor authentication (MFA).
In a Private Industry Notification (PIN), the FBI...
U.S. mailing services company Pitney-Bowes experienced services outages after a ransomware attack earlier this week.
“It has been confirmed that our systems have been affected...