Join or sign in Register for your free TechRepublic membership or if you are already a member, sign in using...more
Security
Zero Trust at Scale eBook
Zero Trust at Scale will provide you with an insider’s lens into this five-month Zero Trust security metamorphosis, helping you...more

Top 6 Multi-Cloud Security Solution Providers
If you're in the process of constructing a multi-cloud security plan, these providers can help you avoid the most common...more

6 ways to reduce your IoT attack surface
Image: stnazkul/Adobe Stock The Internet of Things is a massive attack surface that grows bigger every day. These devices are...more
Multicloud Application Security: Trends, Considerations and Best Practices
The suitability of the cloud for most workloads is no longer in question. On the contrary, most organizations use multiple...more

Tech news you may have missed Oct. 28–Nov. 3
New Microsoft 365 deployment tools, making OneDrive work on your iPhone, and a new Cranefly backdoor lead the top news...more

Open-source repository SourceHut to remove all cryptocurrency-related projects
Also including blockchain-related projects in the ban, SourceHut's creator said the technology is associated with fraudulent activities and high-risk investments....more

3 inexpensive steps to secure IoT
IoT devices can be openings for attackers, causing major disruptions to businesses. Follow these three steps to secure your IoT...more

Cranefly uses new communication technique in attack campaigns
Image: James-Thew/Adobe Stock A new publication from Symantec, a Broadcom software company, reveals details about a new method used by...more

2022 cyber threat report details growing trends
Image: Askhat/Adobe Stock The cyberthreat landscape is constantly evolving, with new attacks developing every day. In their new report, SonicWall...more