Loading...
October 31, 2019
Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims. Read more â¶
The biggest data breach fines, penalties and settlements so far
4 big changes coming to cybersecurity in 2020 and beyond
The security staffing problem isn't going away. Now what?
6 top OSINT tools: Find sensitive public info before hackers do
Stop ignoring printer security: It's time for CSOs to take control
Compliance mandates, cybersecurity best practices dominate 2019 security priorities
To extract the most value from their infrastructure investment, many small to medium businesses choose multi-function servers. Read more â¶
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting. Read more â¶
DEALPOST
Read more â¶
The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large. Read more â¶
6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover. Read more â¶
Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more â¶
Despite shipping with mature security features, most printer deployments are insecure because of misplaced financial and organizational incentives. Read more â¶
IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices. Read more â¶
HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors, are configured with a silicon root of trust to detect and recover firmware from compromise or breach. Read more â¶
© 2024