Data Privacy & Security

What Is Bitwarden's Cupid Vault for Secure Sharing?
Data Protection & Privacy What Is Bitwarden's Cupid Vault for Secure Sharing?

Sharing access to a joint bank account or the family streaming service has often forced individuals into a precarious digital dance, exchanging sensitive credentials through glaringly insecure channels. This common practice exposes critical information to interception and misuse, creating a

Gartner: AI Data Spurs Need for Zero-Trust Governance
Endpoint & Device Security Gartner: AI Data Spurs Need for Zero-Trust Governance

With us today is Rupert Marais, our in-house security specialist whose expertise spans everything from endpoint security to overarching cybersecurity strategy. We’re diving deep into the seismic shifts AI is causing in data governance and risk management. We'll explore the urgent need for a

BeyondTrust Warns of Critical Flaw Allowing System Takeover
Data Protection & Privacy BeyondTrust Warns of Critical Flaw Allowing System Takeover

A single, maliciously crafted request sent across the internet could be all it takes for an attacker to seize complete control of an organization's most sensitive access management systems. This is the stark reality presented by a newly discovered vulnerability in BeyondTrust's core products, a

Microsoft 365 Outage Locks Out North American Admins
Data Protection & Privacy Microsoft 365 Outage Locks Out North American Admins

For countless IT administrators across North America, the workday began not with a routine check of systems but with a digital wall, as the central nervous system of Microsoft 365 suddenly and inexplicably went offline. The Critical Hub Goes Dark Understanding the Admin Center Disruption A

How Are State-Sponsored Hackers Weaponizing AI?
Data Protection & Privacy How Are State-Sponsored Hackers Weaponizing AI?

The line between a meticulously researched professional inquiry and a state-sponsored cyberattack has blurred to the point of invisibility, thanks to the widespread adoption of artificial intelligence by the world’s most sophisticated threat actors. What was once the domain of theoretical security

Supply Chain Attacks Fuel Surge in Cyber Extortion
Data Protection & Privacy Supply Chain Attacks Fuel Surge in Cyber Extortion

The interconnectedness that powers modern commerce has become a double-edged sword, as a new analysis reveals that trust in digital partnerships is being systematically weaponized by cybercriminals at an unprecedented scale. A comprehensive review of dark-web activity throughout 2025 uncovered a

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later