The tech giants that the CCPA attempted to target were able to escape liability by capitalizing on a convenient loophole that excluded data analytics from the definition of a sale. New CCPA enforcement letters could have major implications for the broader data ecosystem —
third-party data may disappear as we know it. The time has come to provide consumers with value for opting in.
November is Infrastructure Security Month and a time to think about how organizations can contribute to the security and resilience of the U.S.'s essential services and functions.
Lookout, Inc. released a report showing that mobile phishing exposure surged 161% within the energy industry between the second half of 2020 and the first half of 2021.
Enterprise organizations around the world are adapting to work from anywhere (WFA) models. The challenge of securing WFA environments could be solved by biometric authentication.
You must’ve heard it dozens of times by now: passwords are not secure enough to protect business data. But everyone mentions alternatives to passwords as if uprooting your current identity authentication system is a piece of cake.
Miro Pihkanen joins OwlGaze as their new Chief Security Officer (CSO) and Board Member. In his security and advisor roles, Pihkanen will help the organization finalize a cyber threat detection solution.
As organizations shift to permanent hybrid work environments, security leaders must weigh the benefits and challenges of a Bring Your Own Device (BYOD) model.
Security researchers at the Lookout Threat Labs have discovered a new Android malware, dubbed AbstractEmu, with rooting capabilities distributed on Google Play and major third-party stores, including the Amazon Appstore and Samsung Galaxy Store.
Incidents tend to happen at the seams and cracks of your organization, where the automation is incomplete, observability is not omniscient, and humans are still in the loop. Our blind spots are constantly evolving, and we must update our mental models of how to approach security accordingly.
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published the first of a four-part series, Security Guidance for 5G Cloud Infrastructures.