Security Awareness

19a7ca3d87a072ea73d7ad53df294881

Fight Fileless Malware on All Fronts

November 06, 2018 Added by:Phil Richards

Fileless malware has become the darling of cyber criminals because, quite simply, it’s a no-brainer.

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

How to Protect SMBs Against Phishing Attacks via Social Engineering

November 06, 2018 Added by:Timur Kovalev

Attackers are constantly changing tactics, so ensuring that you are armed against the latest threats is critical.

Comments  (0)

1cc412454c5b595d95d2a2ef19d9755f

DDoS Disruption: Election Attacks

November 05, 2018 Added by:Hardik Modi

With all eyes on the 2018 US midterm elections November 6, election officials are on high alert for DDoS attacks.

Comments  (0)

A4c42684a8889958a83ecca5d2fe59e5

Buy, Rent, or Uber Your Security Operations Center

November 05, 2018 Added by:A. N. Ananth

What better way to provide continuous monitoring and analysis than through a security operations center (SOC)? But a SOC is complex and expensive.

Comments  (0)

9375e58c8325b652f623d22b5e9fda3f

Most SMBs Fold after Cyber Attacks: Here’s How to Protect Yours

October 12, 2018 Added by:Arun Gandhi

Perpetrators specifically target smaller, more vulnerable businesses because of their lack of security expertise and fragile infrastructure.

Comments  (0)

71fd135c31a6d0bc64f3b46c190a4590

How Can Businesses Protect against Phishing Attacks on Employee Smartphones?

October 11, 2018 Added by:Matt Johnson

It is vital that business leaders educate themselves on the types of attacks that today’s scammers are using, and advise employees on how best to protect themselves.

Comments  (0)

8bfed574fad1aecf3a4606bdac0e82f8

NIST and the Small Business: Addressing Cyber Insecurity

October 09, 2018 Added by:Baan Alsinawi

In August, President Trump signed the NIST Small Business Cybersecurity Act.

Comments  (0)

F9b46f5646b843bd0f87903611d30aad

Ransomware: Keep Safe and Stay Safe

October 09, 2018 Added by:Richard Hummel

Ransomware may not be the threat it once was, but it still poses a risk to the files and systems of businesses everywhere.

Comments  (0)

1a097da944042b7ffb4af15523c405ba

Embracing Cybersecurity Best Practices, No Matter Where You Are

October 05, 2018 Added by:Mike McKee

Much like your physical health, there is no way to guarantee cyber health.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

6 Ways to Use CloudTrail to Improve AWS Security

October 02, 2018 Added by:Sanjay Kalra

Managing security in Amazon Web Services (AWS) is not a set-it-and-forget-it type of proposition.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

“You’re Both Right…Now Go To Your Rooms!”

October 02, 2018 Added by:Reuven Harrison

Traditionally, DevOps and security have butted heads, which causes a stalemate.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

DNC Phishing Scare Was a Training Exercise Gone Awry: Lessons Learned

October 02, 2018 Added by:Perry Carpenter

The recent phishing attack on the Democratic National Committee (DNC) was only a test conducted by the Michigan Democratic Party.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

What Exactly is Threat Hunting - and Why Does it Matter?

September 24, 2018 Added by:Troy Kent

Though there is debate over the various attributes that make up threat hunting, every SOC has the potential to engage in some level of hunting – and taking action is what’s truly important.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

It's Time to Get Real about Complex, Emerging Threats

September 12, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

130c36bd4e626734d3c3de4e43cdbb8c

Busting the VDI Security Myth

September 11, 2018 Added by:Tal Zamir

Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.

Comments  (0)

53c787f0dd688c758b5610aa09af8f13

How Secure Are Popular Finance Apps on Google Play?

September 04, 2018 Added by:Min Pyo Hong

Analysis of the top free Android finance apps on Google Play revealed critical, medium and low security vulnerabilities.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »