Loading...
December 18, 2018
The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process. Read more â¶
Review: Continuous cybersecurity monitoring with CyCognito
13 data breach predictions for 2019
Fear and loathing defending ICS security at DoE's CyberForce Competition
Sextortion group behind bomb threat spam campaign
Top 10 worst password FAILS of 2018
How to end a romance scam
8 old technologies that still play roles in security
The Modern Workforce Insight Report explores how the workforce is evolving. How itâs being shaped by both technology and culture, how companies are adapting and some of the challenges â and opportunities â that it presents. Read more â¶
How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions. Read more â¶
FROM OUR BUSINESS PARTNERS
RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more â¶
Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative. Read more â¶
The mass-emailed bomb threats, which demanded bitcoin payments, seem to have come from a sextortion group. Read more â¶
The worst password offenders this year have been revealed. Top on the list: Kanye West's on-TV reveal of his iPhone password of 000000. Read more â¶
Use this two-part test to convince romance scam victims that their âtrue loveâ is a fraud. Read more â¶
Newer isn't always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems. Read more â¶
© 2024