November 28, 2019
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more â¶
Data breached in translation
Russiaâs Sandworm hacking group heralds new era of cyber warfare
How to secure your router and home network
Is your MSP an insider threat?
10 ways to kill your security career
The 5 CIS controls you should implement first
Enterprises are increasingly being asked to improve security protection while simultaneously maintaining business and network performance. To address this, host-based segmentation is increasing in adoption. Read more â¶
Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure. Read more â¶
DEALPOST
This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more â¶
In-depth research on Russia's Sandworm hacking group shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world. Read more â¶
Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers. Read more â¶
MSPs and managed security services providers (MSSPs) are attracting attention from attackers, who see them as a gateway to access their clients' networks. Follow this advice to minimize the risk. Read more â¶
A breach wonât necessarily doom your career, but these missteps could hamper your professional ambitions. Read more â¶
The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more â¶
Security segmentation reduces your attack surface and prevents the spread of breaches inside your data center and cloud environments. Read more â¶