Loading...
August 19, 2019
A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more â¶
More critical Remote Desktop flaws expose Windows systems to hacking
ICS security: Popular building management system vulnerable to takeover
How to check Privileged Identity management settings for Office 365
Beware rogue email rules and forms
Staffing the CISO office: A call to senior management for some expansive thinking
Thoughts from Defcon 27 â This is why I do what I do
The CIOâs guide to building the unified, digital workspace for todayâs hybrid and multi-cloud strategies. Read more â¶
Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed. Read more â¶
DEALPOST
This intuitive collaboration platform is made for teams that move. Read more â¶
Remotely exploitable vulnerability in internet-connected devices gives attackers a means to cause disruption and damage in a wide range of industries. Read more â¶
Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk. Read more â¶
Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Hereâs how to make sure you can detect it. Read more â¶
More companies need to realize that an inherent staffing misalignment around their CISO role presents potentially critical exposure to the organization. Read more â¶
Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the majority of the conference space. So, what makes this one of the most relevant and successful security conferences? Read more â¶
Read the Q1 2019 Quarterly Threat Report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization. Read more â¶
© 2024