Security and privacy Security and privacy feed

With the increasing popularity of the Internet of Things and cloud services, encryption and security best practices are more important than ever.

Chat bubbles

Open source voice-assistant technology aims to avoid the privacy and security vulnerabilities seen in proprietary tech.
Locks and a fingerprint

Centralizing logs and structuring log data for processing can mitigate risks related to insufficient logging.
Locks and a fingerprint

Do you want J. Random Hacker to be able to pretend they're your bank?
lock on world map

A step-by-step survival guide to reduce your vulnerability to the next database disaster.
lock on world map

Learn about a pen-testing tool intended to test the security of WiFi access points for all types of threats.
question mark in chalk

What is a certificate, why do they expire, and what could happen when they do?
Bright gears connecting

The journey to DevSecOps begins with empowerment, enablement, and education. Here's how to get started.
Getting started with DevSecOps

This guide will help you get started with DevSecOps.