Five worthy reads: Differential privacy—what it means for businesses

Five worthy reads: Differential privacy—what it means for businesses

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one of the evolving privacy-enhancing techniques called differential... Read more »

Securing endpoints, part 1: Ensuring hackers don’t manipulate your browsers to carry out attacks

By Bhuvaneswari Kg In a world of automation, computers and the data on them have become the backbone of many organizations. But data is a double-edged sword. It can be leveraged by... Read more »

44 vulnerabilities, including 3 zero-days, fixed in August 2021 Patch Tuesday

By Karthika Surendran After last month’s PrintNightmare vulnerability, system admins are only just catching their breaths, but this month’s Patch Tuesday is already here, so it’s back to hustling for IT teams.... Read more »

Why implementing Zero Trust is more important than ever before

By Sree Ram Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore why organizations should implement Zero Trust... Read more »