March 31, 2020
Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information. Read more â¶
3 ways COVID-19 is changing CISO priorities
12 top IDS/IPS tools
10 identity management metrics that matter
Cybercriminal group mails malicious USB dongles to targeted companies
Free security resources for work-from-home employees during the COVID-19 crisis
8 key security considerations for protecting remote workers
This case study highlights how deploying Microsoft Azure Sentinel allowed the team to leverage existing assets and achieve a seamless transition to scalable, cloud-based security. Read more â¶
The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020. Read more â¶
DEALPOST
GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more â¶
An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market. Read more â¶
Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution. Read more â¶
Shown as a proof-of-concept in 2014, this is the first known use of the BadUSB exploit in the wild. Read more â¶
Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home. Read more â¶
Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more â¶
The challenge: Execute a seamless transition to a new security platform. Read more â¶