Encrypted email service ProtonMail is now accessible over Tor

The creators of encrypted email service ProtonMail have set up a server that’s only accessible over the Tor anonymity network as a way to fight possible censorship attempts in some countries. ProtonMail was created by computer engineers who met while working at the European Organization for Nuclear Research (CERN). The service provides end-to-end encrypted email…

Survey Says 66% Of Consumers Won’t Work With Breached Companies

Customers are willing to take risks online yet hold businesses responsible for protecting their data. A global survey by Gemalto finds that despite being aware of online security risks, customers continue to take chances but expect protection from businesses that handle their data – despite only 29% believing that companies will protect their data seriously…

Protecting Your Staff in Co-Working Spaces

Four walls, a sea of cubicles and the rest of the traditional office accoutrements are no longer standard in the working world. The number of innovative co-working spaces continues to rise around the world, and this doesn’t even include coffee shops, libraries and numerous other public places that offer free Wi-Fi. That means that your…

User Behavior Analytics: Perfect for Analysis but Not Security

How many times have you read or heard about user behavior analytics (UBA)? Today this term applies to security managers and auditors but not to security administrators. User behavior analytics enable IT teams to track and quickly analyze user behavior anomalies and monitor watch-lists, trends and many other factors relative to users. UBA is a…