Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Smackdown: Enterprise monitoring vs TLS 1.3 and DoH

Smackdown: Enterprise monitoring vs TLS 1.3 and DoH

New encryption standards TLS 1.3 and DNS-over-HTTPS are sweeping the last crumbs of visible user activity off the enterprise network table. Fail to take any action, and within two years, you'll lose the ability to analyze network traffic and detect the cyberthreats that will endanger your organization.

12 hours ago by

Apricorn Aegis Secure Key 3NXC

Apricorn Aegis Secure Key 3NXC

The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have been asking for -- USB-C support.

August 5, 2020 by