Loading...
The day's top cybersecurity news and in-depth coverage
August 12, 2020
Do you know what SSL protocols you expose to your users? Are your settings optimized for security? Have you properly deprecated older TLS certs? Here's what you need to know. Read more â¶
CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workersâ horizons â strategies that they say are paying off with stronger security and better aligned risk management.
Researchers have discovered eighteen new vulnerabilities in how email systems authenticate senders, making it even easier for criminals to fool users.
Research presented at this week's Black Hat conference highlights a new threat via protocol translation attacks and reveals 9 flaws found in protocol gateways from different vendors.
Maintaining a high level of resilience, increasing of backup performance, reduction of recovery time objectives (RTOs) and recovery point objectives (RPOs) â these are the main challenges that modern companies face to on their way to providing Availability and data protection.
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.
Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.
© 2024