New & Notable
Productivity apps and messaging security News
October 26, 2018
A remote code execution flaw in Cisco Webex -- called WebExec -- could be an easy vector for insider attacks, and the researchers who found it say it's easier to exploit than detect.
September 28, 2018
News roundup: The U.N. accidentally exposed credentials on public Trello boards. Plus, Uber is set to pay $148 million settlement following its 2016 data breach cover-up, and more.
September 21, 2017
An undocumented Word feature found by Kaspersky Lab could lead to system information theft and affects users on both PCs and mobile devices.
July 11, 2017
Experts said the new Android Samba app from Google supported only unsafe SMBv1 despite susceptibility to WannaCry exploits and unclear demand from users.
Productivity apps and messaging security Get Started
Bring yourself up to speed with our introductory content
Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user provides two different authentication factors to verify themselves to better protect both the ... Continue Reading
The best email security policy requires a holistic approach of the issue, understanding both the problem's scope and the most likely threats. Continue Reading
Secure cloud computing demands up-to-date knowledge and a sharp set of IT security skills. Stay current on the essentials in the cloud security arena. Continue Reading
Evaluate Productivity apps and messaging security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Securing Office 365 properly requires addressing upfront any specific risks of a particular environment and taking advantage of the many security controls Microsoft offers. Continue Reading
Online and application security is never perfect, but Office 365 security features come close. Here's an overview of how Microsoft installed security in its popular suite. Continue Reading
Office 365 security concerns should worry you but not dampen your enthusiasm for the platform's potential benefits for your business. Here's what you need to consider upfront. Continue Reading
Manage Productivity apps and messaging security
Learn to apply best practices and optimize your operations.
WhatsApp vulnerabilities can enable hackers to bypass end-to-end encryption and spoof messages. Expert Michael Cobb explains how these attacks work and how to prevent them. Continue Reading
Effectively tackling email security issues requires infosec pros to address a broad range of areas, including cloud, endpoints, user training and more. Continue Reading
Building an effective application security program can be daunting. Sean Martin talks with experts about the best first steps enterprises should take. Continue Reading
Problem Solve Productivity apps and messaging security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Education and training are crucial parts of a strong application security program. Sean Martin explains how enterprises should build these elements into their programs. Continue Reading
Microsoft open sourced its .Net framework recently, and enterprises are concerned. Expert Michael Cobb explores if the fears of open source .Net are warranted. Continue Reading
Continuous code delivery is critical in certain scenarios, but it's not always the most secure approach. Michael Cobb explains how to secure code in a continuous delivery model. Continue Reading