We select and review products independently. When you purchase through our links we may earn a commission. Learn more.
X
X
The Best Tech Newsletter Anywhere

Join 425,000 subscribers and get a daily digest of news, geek trivia, and our feature articles.

What Does It Mean to “Shift Security Left?”

“Shift left security” refers to a software development model which fully considers security from the outset. Until quite recently, security tended to come at the very end of the process in the form of a go-live audit. This im…

The Many Faces of Social Engineering

Social engineers know which buttons to press to make you do what they want. Their time-honored techniques really work. so it was inevitable that cybercriminals would apply those techniques to cybercrime….

How To Defend Yourself Against API Attacks

Modern cloud strategies make heavy use of APIs for controlled, interactive access to hosted services. But the access is only controlled if the APIs are securely implemented and they’re not susceptible to abuse….

Using 2FA? Great. But It’s Not Infallible

You should use two-factor authentication wherever it is available. It isn’t perfect, but it stops most attackers in their tracks. But don’t be fooled into thinking it’s impregnable. That’s not the case….
How-To Geek is where you turn when you want experts to explain technology. Since we launched in 2006, our articles have been read more than 1 billion times. Want to know more?