“Hey Joe, I wanted to remind you that starting next Monday you will be expected to teach from home. The lesson…
Tag: security
Security tips for working from home (WFH)
Over the last decade, remote work and working from home has grown in popularity for many professionals. In fact, a 2018…
A week in security (March 2 – 8)
Last week on Malwarebytes Labs, we fired up part 1 of our series on child identity theft, asked how well law…
Lock and Code S1Ep1: On RSA, the human element, and the week in security
Last week, we told you we were launching a fortnightly podcast, called Lock and Code. This week, we made good on…
Explained: the strengths and weaknesses of the Zero Trust model
In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security…
Explained: edge computing
Edge computing may seem like a foreign and future-facing term. Yet its applications are widespread and diverse, with the ability to…
Explained: What is containerization?
Containerization. Another one of those tech buzzwords folks love to say but often have no idea what it means. A better…
A week in security (November 11 – 17)
Last week on Malwarebytes Labs, we offered statistics and information on a sneaky new Trojan malware for Android, inspected a bevy…
Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press
When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more…
A week in security (October 7 – 13)
Last week on Malwarebytes Labs, we peered into the possible future of cybersecurity insurance, described the process for securing today’s managed…