December 18, 2018
How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions. Read more â¶
13 data breach predictions for 2019
Review: Continuous cybersecurity monitoring with CyCognito
Fear and loathing defending ICS security at DoE's CyberForce Competition
How to stop malicious email forwarding in Outlook
Embracing risk management elevates security pros to business leaders. Why do they still find it so difficult?
What is a keylogger? How attackers can monitor everything you type
Best security software: How 25 cutting-edge tools tackle today's threats
The Modern Workforce Insight Report explores how the workforce is evolving. How itâs being shaped by both technology and culture, how companies are adapting and some of the challenges â and opportunities â that it presents. Read more â¶
The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process. Read more â¶
FROM OUR BUSINESS PARTNERS
RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more â¶
Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative. Read more â¶
Microsoft Office 365 administrators can use these settings to find and delete hidden rules attackers use to intercept Outlook email messages. Read more â¶
The transition from an âitâs all about security and protecting the crown jewelsâ to âwe need to mitigate risk and embrace risk managementâ is a crucial step next step for the information security profession. Read more â¶
Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks. Read more â¶
Lab tested reviews of the most innovative, useful and, arguably, best security software. Read more â¶