April 03, 2019
Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets. Read more â¶
How to prepare for the Windows 10 1903 security feature update
Chinese hacking groups to ramp up cyber attacks on some industries, experts say
How hackers use ransomware to hide data breaches and other attacks
11 questions to ask before buying AI-enabled security software
Mastering email security with DMARC, SPF and DKIM
How spyware works and how to prevent it
DNS can become the first line of defense against advanced threats. Read more â¶
Microsoft is changing the way it does Windows 10 feature updates, and that will affect how you schedule update deferrals. Here's what you need to know. Read more â¶
FROM OUR BUSINESS PARTNERS
Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more â¶
Companies in industries critical to Chinaâs five-year plan face a higher risk of nation-state-sponsored cyber attacks. Read more â¶
Most ransomware is used simply to make money. However, it can also be used as part of an attackerâs exit strategy to wipe out forensic evidence of a more serious breach. Read more â¶
Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up in the second camp. Read more â¶
The three main email security protocols complement one another, so implementing them all provides the best protection. Thatâs easier said than done, but these tips can help. Read more â¶
Spyware is a broad category of malware designed to secretly observe activity on a device and send those observations to a snooper. It is used by everyone from nation states to jealous spouses. Read more â¶