Loading...
December 04, 2018
Checking for security flaws in your applications is essential. These tools can help find and fix them. Read more â¶
Top application security tools for 2019
What is physical security? How to keep your facilities and devices safe from on-site attackers
US senator proposes jailing execs, fining companies for data breaches
Learn to play defense by hacking these broken web apps
10 essential PowerShell security scripts for Windows administrators
How to reach that person who will click on anything
Cyber threats fueled by AI: Security's next big challenge
Making the public cloud interoperable with on-premises solutions needs to be part of your hybrid cloud strategy for secondary data workloads. Legacy solutions, however werenât architected with the cloud in mind. Read more â¶
Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses. Read more â¶
FROM OUR BUSINESS PARTNERS
RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more â¶
Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches. Read more â¶
OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management. Read more â¶
PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores Read more â¶
There's always that one person who falls for every phishing scam. This is how you break them of that habit. Read more â¶
Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles. Read more â¶
Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting. Read more â¶
© 2024