Computer insecurity, Physical security, Cloud computing, Security, Authorization, Information security

How Can We Vaccinate Our Networks?

On Feb 1, 2021
@securityweekly shared
Learn how to vaccinate your network - Read Now! https://t.co/xdAipYiF0j https://t.co/9mAmRhdgBV
Open

The news is flooded with updates regarding the COVID-19 vaccine.  Cyberattacks are targeting the vaccine supply chain.  Phishing attacks are exploiting sign-ups for the vaccine.  There are even attacks to get access to vaccine data.  Sounds a lot like our enterprises every day!  ...

securityweekly.com
On Feb 1, 2021
@securityweekly shared
Learn how to vaccinate your network - Read Now! https://t.co/xdAipYiF0j https://t.co/9mAmRhdgBV
Open

How Can We Vaccinate Our Networks?

How Can We Vaccinate Our Networks?

The news is flooded with updates regarding the COVID-19 vaccine.  Cyberattacks are targeting the vaccine supply chain.  Phishing attacks are exploiting sign-ups for the vaccine.  There are ...

Integrating Application Security Testing Data to Drive Better Decisions

Integrating Application Security Testing Data to Drive Better Decisions

The growth of application development, DevOps, containers, and cloud has fueled the growth of application security tools.  We now have static analysis, software composition analysis, ...

Modernize Security with Zero Trust and Controlled Access Anywhere

Modernize Security with Zero Trust and Controlled Access Anywhere

A zero-trust security architecture makes increasing sense in a world of remote work.

How to Secure Your Corporation

How to Secure Your Corporation

This guide is meant to provide a foundation for decision makers and employees on the cybersecurity issues surrounding the platforms we use and the products we make.

IoT Security Trends, 2021: COVID-19 Casts Long Shadow

IoT Security Trends, 2021: COVID-19 Casts Long Shadow

While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.

Top 10 Cybersecurity Threats in 2021 and How to Protect Your Business

Top 10 Cybersecurity Threats in 2021 and How to Protect Your Business

Cyberattacks have grown in sophistication and volume in 2020. Here is a list of 10 threats you should be aware of for 2021.

“Nope, Go Phish” – How Organizations Can Finally Put a Stop to The Oldest Hacking Trick

“Nope, Go Phish” – How Organizations Can Finally Put a Stop to The Oldest Hacking Trick

By Torsten George, cybersecurity evangelist, Centrify Phishing is one of the oldest tricks in a hacker’s playbook. The tactic can lure any employee from blissfully going about their ...

Eight Best Practices for Securing Long-Term Remote Work

Eight Best Practices for Securing Long-Term Remote Work

Fortinet conducted a survey and outlined eight areas of focus that explore the challenges organizations faced as a result of the shift in remote work, and how organizations will secure ...

CrowdStrike Joins with Netskope, Okta and Proofpoint to Secure Remote Work Anytime and Anywhere at Scale

CrowdStrike Joins with Netskope, Okta and Proofpoint to Secure Remote Work Anytime and Anywhere at Scale

CrowdStrike has joined forces with Netskope, Okta and Proofpoint to protect today’s dynamic and remote working environments at scale.

7 Key Cybersecurity Tips for Small Businesses

7 Key Cybersecurity Tips for Small Businesses

Nearly 60% of small businesses have experienced a data breach, and the stakes are high. Here are tips to stay prepared.

How To Improve Your Startup’s Cybersecurity

How To Improve Your Startup’s Cybersecurity

While branding, marketing campaigns, and product quality will be at the forefront of your mind, don't overlook cybersecurity.

Don't let edge computing security concerns derail your plans

Don't let edge computing security concerns derail your plans

Edge computing security concerns prevent a lot of businesses from moving to the edge. But experts say that, with some planning and forethought, enterprises can plug security holes and reap ...

How to Prevent Cyberattacks on Remote Employees

How to Prevent Cyberattacks on Remote Employees

While remote work can be an exciting opportunity, it comes with cybersecurity risks. Here's how to prevent cyberattacks on remote employees.

Cyber Warfare – How Organizations Can Manage Risks

Cyber Warfare – How Organizations Can Manage Risks

Written by Safi Raza, Director of Cybersecurity, Fusion Risk Management. The recent confrontation between the U.S. and Iran not only posed the risk of military conflict, but of cyber ...

Insights From European Customers on Cybersecurity and Security Awareness

Insights From European Customers on Cybersecurity and Security Awareness

Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and ...

How to protect a distributed workforce

How to protect a distributed workforce

Where does your organization sit regarding a cyberattack or data breach? Are you well-prepared?

Australian Government Issues Mailto Ransomware Warning

Australian Government Issues Mailto Ransomware Warning

The Australian Cyber Security Centre (ACSC) releases Mailto ransomware advisory with guidance that may assist managed security service providers (MSSPs) worldwide.

Your best customer retention strategy – proactive security

Your best customer retention strategy – proactive security

If you’re a small business or a company without dedicated IT resources, these statistics may be the wake-up call you need.

Volume XXII - Issue #15

Volume XXII - Issue #15

Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.