
Unprotected Server Exposes Weight Watchers Internal IT Infrastructure
Researchers found that a critical Weight Watchers server revealed its IT internal infrastructure....

SaaS security – surely it’s simple?
The NCSC's new SaaS security collection provides a lightweight approach for determining the security of any SaaS application....

Office 365 security review
Microsoft Office 365 is a set of cloud-based productivity tools including word processing, spreadsheets and...

Trello security review
Trello is a collaboration tool which uses Kanban-style boards to organise projects and teams. ...

Jira security review
Atlassian Jira is an issue tracking and planning tool, primarily aimed at software development. ...

Stride security review
Stride is an enterprise communications tool featuring team chat, video and file sharing...

Confluence security review
Atlassian Confluence is a group collaborative writing tool. How Confluence performs against the SaaS...

Slack security review
Slack is a real-time messaging and file sharing application designed to aid group collaboration. ...

SaaS security principles
The table below lists each SaaS security principle, along with a brief description of its...

MailChimp security review
MailChimp is an email service provider which allows users to send automated messages, marketing...

SaaS security collection
Software as a Service (SaaS) applications are increasingly popular. Many of us use them on a daily...

G Suite security review
Google G Suite is a collection of productivity tools including spreadsheets, word processing and calendar....

Smartsheet security review
Smartsheet is an application for managing collaborative work. Creating projects and tasks, assigning these...

Understanding Software as a Service (SaaS) security
This guidance introduces the approach the NCSC have developed to help you understand the security...

Zendesk security review
Zendesk is a ticketing system whose primary aim is to improve customer relations....

Basecamp security review
Basecamp is a web-based project management and company-wide communication tool designed to improve the administration of...

Yammer security review
Yammer is an enterprise social networking service which allows users to communicate, collaborate and...

Google Tackles AI Principles: Is It Enough?
AI offers an immense capacity for good -- and for unintended consequences. ...

Facebook Software Bug Made Some Private Posts Public: 14 Million Affected
A Facebook glitch in May set millions of posts that users composed to...

GDPR: A Compliance Quagmire, for Now
Experts say the devil is in the details when it comes to complying...

Serve websites over HTTPS (always)
Securing websites, so they keep user data private, is an essential element of...

DNA Testing Service MyHeritage Leaks User Data of 92 Million Customers
An unspecified "private" server was found with the account data of users who...

Facebook Defends Against Device-Integrated APIs Policy
Facebook is again in hot water after an article alleged it struck deals...

Three random words or #thinkrandom
You're probably aware that there’s a lot of guidance out there on what...

Public Google Groups Leaking Sensitive Data at Thousands of Orgs
The exposed information includes accounts payable and invoice data, customer support emails, password-recovery...

Honda, Universal Music Group Expose Sensitive Data in Misconfig Blunders
The Honda mistake affects 50,000 users of the Honda Connect App, while UMG...

ICANN Launches GDPR Lawsuit to Clarify the Future of WHOIS
WHOIS, the searchable "phonebook" of contact data for internet domains, may violate GDPR...

Bug In Git Opens Developer Systems Up to Attack
A serious vulnerability was patched by developers behind Git that closes the door...

Fraudsters Claim To Hack Two Canadian Banks
Two Canadian banks reported that they may be targets of a hack after...

SEVered Attack Extracts the Memory of AMD-Encrypted VMs
Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that...