Latest Posts
Modernizing Web Filtering for K-12 Schools
December 18, 2019 Added by:Timur Kovalev
Today’s 24/7 Internet access world underlines the importance of fine-tuned web filters and content security across K-12 networks.
Comments (0)
University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
December 04, 2019 Added by:InfosecIsland News
University of Arizona-led teams will be more proactive in the battle against cyberthreats thanks to nearly $1.5 million in grants from the National Science Foundation.
Comments (0)
Securing the Internet of Things (IoT) in Today's Connected Society
November 19, 2019 Added by:Steve Durbin
The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.
Comments (0)
What Is Next Generation SIEM? 8 Things to Look For
November 14, 2019 Added by:Avi Chesla
Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.
Comments (0)
Cybersecurity and Online Trading: An Overview
October 25, 2019 Added by:Sam Bocetta
Take a look at how and why the risks of international trade are increasing, and the political response to this.
Comments (0)
Artificial Intelligence: The Next Frontier in Information Security
October 23, 2019 Added by:Steve Durbin
The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security.
Comments (0)
Five Main Differences between SIEM and UEBA
October 23, 2019 Added by:Nilesh Dherange
Five ways in which SIEM and UEBA technology differs.
Comments (0)
For Cybersecurity, It’s That Time of the Year Again
October 17, 2019 Added by:Assaf Harel
It’s a race against time and a reactive security approach that waits for a vulnerability to be discovered and then issues patches is lacking, to put it lightly.
Comments (0)
Myth Busters: How to Securely Migrate to the Cloud
October 17, 2019 Added by:Bill Saltys
Security must remain a top priority for IT professionals during the migration process, and there is a successful pathway to safely and securely migrate to the cloud.
Comments (0)
Microsoft Makes OneDrive Personal Vault Available Worldwide
October 01, 2019 Added by:Ionut Arghire
Microsoft said that users all around the world can now keep their most important files protected in OneDrive Personal Vault.
Comments (0)
Human-Centered Security: What It Means for Your Organization
September 24, 2019 Added by:Steve Durbin
Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.
Comments (0)
How Ethical Hackers Find Weaknesses and Secure Businesses
September 11, 2019 Added by:Johnny Rice
Approaching your currently implemented security as a target to beat or bypass is the strongest and fastest way to find any flaws that may already exist.
Comments (0)
New Passive RFID Tech Poses Threat to Enterprise IoT
September 11, 2019 Added by:Sam Bocetta
The accelerating pace of RFID tech will make our lives more convenient. With greater convenience, however, comes a greater need for security solutions.
Comments (0)
Android RAT Exclusively Targets Brazil
September 02, 2019 Added by:Ionut Arghire
A newly discovered Android remote access Trojan (RAT) is specifically targeting users in Brazil, Kaspersky reports.
Comments (0)
Three Strategies to Avoid Becoming the Next Capital One
August 30, 2019 Added by:George Gerchow
Three strategies to preventing catastrophic cloud security issues.
Comments (0)
Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment
August 29, 2019 Added by:Steve Durbin
Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.
Comments (0)
If You Don’t Have Visibility, You Don’t Have Security
August 20, 2019 Added by:Shiva Mandalam
You can’t protect what you can’t see…or what you don’t know about. Without comprehensive visibility, there will always be the chance that your false sense of security could be shattered at any time as attackers discover the vulnerable assets you aren’t aware of and exploit them to gain access to your network and data.
Comments (0)
Ransomware: Why Hackers Have Taken Aim at City Governments
August 19, 2019 Added by:Sam Bocetta
The only way to stop the trend of ransomware is for municipal organizations to build a reputation of having strong security defenses.
Comments (0)
5 Limitations of Network-Centric Security in the Cloud
August 19, 2019 Added by:Sanjay Kalra
Traditional security solutions aim to identify threats at the perimeter of the enterprise, but threats targeting public clouds require a different level of insight and action.
Comments (0)
1 Million South Korean Credit Card Records Found Online
August 08, 2019 Added by:Ionut Arghire
Over 1 million South Korea-issued Card Present records have been posted for sale on the dark web since the end of May.