Loading...
August 21, 2019
Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest itâs time to stop using it where possible. Hereâs how. Read more â¶
How much should you spend on security?
Marketing security: 8 tips for recruiting users to your cause
6 risk factors to know when hiring an MSSP
Beware rogue email rules and forms
Taxpayer First Act: Improving identity verification and modernizing the IRS
Safe travels: 7 best practices for protecting data at border crossings
In this solution brief, we will examine how attackers are cunningly impersonating popular web services such as Microsoft Outlook, DocuSign and Google Docs to entice victims into giving away their credentials to these services. Read more â¶
Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more â¶
DEALPOST
This intuitive collaboration platform is made for teams that move. Read more â¶
Getting users to care about security is a much-lamented challenge. What you need is a marketing plan. Read more â¶
A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more â¶
Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Hereâs how to make sure you can detect it. Read more â¶
With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit. Read more â¶
Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees. Read more â¶
Read more â¶
© 2024