Latest Blog Posts

Fa42af438e58b799189dd26386f5870f

Microsoft Makes OneDrive Personal Vault Available Worldwide

October 01, 2019 Added by:Ionut Arghire

Microsoft said that users all around the world can now keep their most important files protected in OneDrive Personal Vault.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Human-Centered Security: What It Means for Your Organization

September 24, 2019 Added by:Steve Durbin

Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.

Comments  (0)

019f0bfa701317d0e838d7bb01218770

How Ethical Hackers Find Weaknesses and Secure Businesses

September 11, 2019 Added by:Johnny Rice

Approaching your currently implemented security as a target to beat or bypass is the strongest and fastest way to find any flaws that may already exist.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

New Passive RFID Tech Poses Threat to Enterprise IoT

September 11, 2019 Added by:Sam Bocetta

The accelerating pace of RFID tech will make our lives more convenient. With greater convenience, however, comes a greater need for security solutions.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Android RAT Exclusively Targets Brazil

September 02, 2019 Added by:Ionut Arghire

A newly discovered Android remote access Trojan (RAT) is specifically targeting users in Brazil, Kaspersky reports.

Comments  (0)

239132446c9379ed143375ff11db6a65

Three Strategies to Avoid Becoming the Next Capital One

August 30, 2019 Added by:George Gerchow

Three strategies to preventing catastrophic cloud security issues.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29, 2019 Added by:Steve Durbin

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.

Comments  (0)

6d8601d82d764554c8430f34202031b1

If You Don’t Have Visibility, You Don’t Have Security

August 20, 2019 Added by:Shiva Mandalam

You can’t protect what you can’t see…or what you don’t know about. Without comprehensive visibility, there will always be the chance that your false sense of security could be shattered at any time as attackers discover the vulnerable assets you aren’t aware of and exploit them to gain access to your network and data.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Ransomware: Why Hackers Have Taken Aim at City Governments

August 19, 2019 Added by:Sam Bocetta

The only way to stop the trend of ransomware is for municipal organizations to build a reputation of having strong security defenses.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

5 Limitations of Network-Centric Security in the Cloud

August 19, 2019 Added by:Sanjay Kalra

Traditional security solutions aim to identify threats at the perimeter of the enterprise, but threats targeting public clouds require a different level of insight and action.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

1 Million South Korean Credit Card Records Found Online

August 08, 2019 Added by:Ionut Arghire

Over 1 million South Korea-issued Card Present records have been posted for sale on the dark web since the end of May.

Comments  (0)

019f0bfa701317d0e838d7bb01218770

Top Three Cross-Site Scripting Attacks You Need to Know Now

July 31, 2019 Added by:Johnny Rice

Cross-Site scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Arkose Labs Launches Private Bug Bounty Program

July 29, 2019 Added by:Ionut Arghire

Fraud prevention technology provider Arkose Labs announced the launch of a private bug bounty program on crowdsourced security platform Bugcrowd.

Comments  (0)

D2dfc0582d6b23f510801d8a95d54c7c

Eight Steps to Migrate Your SIEM

July 22, 2019 Added by:Trevor Daughney

The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.

Comments  (0)

2bbe09d8431465f396a98305e7a1c5a6

What Call Center Fraud Can Teach Us about Insider Threats

July 22, 2019 Added by:Saryu Nayyar

Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.

Comments  (0)

9fa920b7e1a16185ac7565a871901719

Best Practices for Remote Workers’ Endpoint Security

July 22, 2019 Added by:Mathivanan Venkatachalam

One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »