The day's top cybersecurity news and in-depth coverage
June 18, 2020
Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own. Read more â¶
Breach concerns, data privacy regulations and new responsibilities for managing risk are elevating the security leadership role
Prosecutors use this guidance to assess criminal liability in a compliance breach, so it behooves business and security leaders to understand the expectations.
The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.
Join Zones and our strategic partner, Cisco, to learn how to confidently secure every business endeavor with an open, integrated platform that scales to meet your security needs.
Regular reviewing of these Windows event logs alone or in combination might be your best chance to identify malicious activity early.
Integrating the KACE AMA with your Microsoft SCCM implementation strengthens both products to ensure that all your endpoints are always protected in todayâs complex IT environment.
Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it makes sense in certain scenarios.
Some organizations have still not implemented an Office patch from 2012. Attackers know this and are exploiting the vulnerability.