universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair
3 blockchain

5 small business security

Small Business Saturday means it’s time for an annual cyber refresh

5 steps that SMBs should take to review and refresh their security policies and procedures.

quell cyber attacks primary

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

gdpr compliance security locks privacy breach

GDPR, I choose you! How the Pokémon Company embraces security and privacy by design

Pokémon Go forced the Pokémon Company International to rethink how it approaches security, and now uses GDPR as an enabler.

Microsoft Windows update arrows on laptop and mobile phone

How to use PowerShell to scan for Windows 10 security updates

Want to review Windows 10 security updates and patches before installing them? Run this PowerShell command.

thumbnail
video

R tip: Keep passwords and tokens secure with the keyring package

Learn how to store credentials in an encrypted, secure keyring within R

thumbnail
video

How to use PowerShell to scan for Windows 10 updates

Here’s how to tell what patches and security improvement are in Windows 10 updates before you install them.

windows bug

Microsoft covertly collects personal data from enterprise Office ProPlus users

Experts raised privacy concerns when a data protection impact assessment found Microsoft covertly collects personal data from users of the enterprise version of Office ProPlus.

square peg round hole no fitting bad idea

The end of security as we know it

Beware of vendors who attempt to abdicate their responsibility to unnamed third-party contractors.

phishing man with life saver sinking danger helpless

How to reach that person who will click on anything

There's always that one person who falls for every phishing scam. This is how you break them of that habit.

computer forensics

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make.

screen shot 2018 09 21 at 10.43.22 am

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

networking background

Possible BGP hijacking takes Google down

Google went down Monday as a border gate protocol (BGP) issue rerouted traffic to China, Russia, and Nigeria.

laptop

HP Offering $330 off Pavilion 15z 15.6" Touchscreen Laptop Right Now ($370)

The pre-Black Friday deal ends Wednesday 11/14 and includes free shipping as well.

Statue of Atlas against a blue sky and large white clouds.

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

hacker

Cyber criminals abuse US Postal Service Informed Delivery for ID theft

Criminals are abusing the US Postal Service's Informed Delivery for ID theft and fraud. Meanwhile, vulnerabilities were found in Oracle's VirtualBox, WordPress and Adobe ColdFusion servers.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

2 industrial iot utility nuclear plant power plant

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

Load More