Zephyrnet Logo

Tag: best practices

How organizations can maintain a third-party risk management program from day one

In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how...

#StayTheFHome urges people to stop the spread of the coronavirus

Stay in. That means don't go out. No, not even for that. Image: Getty Images By Alexis Nedd2020-03-15 15:40:22 UTC In an...

Why do the Certified Ethical Hacking Course

Ethical Hacking is all about studying the techniques, mindset, and tools used by hackers and penetration testers for identifying and correcting vulnerabilities...

Is Synthetic CBD Legal?

Although the enactment of the 2018 Farm Bill legalized hemp, the production of the plant and its derivatives – or certain aspects of...

Three travel startups tell us how they’re responding to the coronavirus crisis

With the globalized world going into partial or complete lock down over the Covid-19 pandemic, startups in the travel sector are facing a...

Working from Home: COVID-19’s Constellation of Security Challenges

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

AI Weekly: Coronavirus spurs adoption of AI-powered candidate recruitment and screening tools

As COVID-19 continues to spread — as of the time of writing (March 12), there were over 139,600 confirmed cases and...

How Can The Coronavirus (COVID-19) Disrupt Cybersecurity Operations?

As the global outbreak of the coronavirus deepens, with the novel virus now having been detected in more than 127 countries. Having...

Apple could help ease coronavirus panic, but it probably won’t

Even by the poor standards of the past two months, the last week of coronavirus news has been especially terrible: multiple...

Voatz ‘Blockchain’ App Used in US Elections Has Numerous Security Issues, Says Report

Voatz, the Massachusetts-based company touting a blockchain-enabled mobile voting app, has been met with public criticism for a lack of transparency, among other...

EARN IT Act threatens end-to-end encryption

by Lisa Vaas While we’re all distracted by stockpiling latex gloves and toilet paper, there’s a bill tiptoeing through...

Transforming Security Through Zero Trust

You may have heard the phrase “zero trust” being thrown around quite a bit lately. While it may sound dystopian, zero trust...

Latest Intelligence

spot_img
spot_img