Since the abrupt shift to remote work, effective endpoint management has become a top challenge in enterprise security. Patching and maintaining laptops and computers, inventorying software, and providing IT support have all become harder. The biggest …Read More Product showcase: Action1 RMM
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 69 has been released today. It’s a free download, no registration required. Table of contents Why threat hunting is obsol…Read More (IN)SECURE Magazine issue 69 released
The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, simulated digital space environments, and ways for dealing with the huge amoun…Read More How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space
There’s been lots of excitement around the recently announced print spooler vulnerability CVE-2021-34527, commonly referred to as PrintNightmare. The excitement stems from the fact that this vulnerability has a CVSS score of 8.8, is present in ALL Wind…Read More July 2021 Patch Tuesday forecast: Don’t wait for Patch Tuesday
Active Directory is central for many companies and used to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for ‘bad actors.’ A security vulnerability could compromise an entire network infrastructure…Read More eBook: Active Directory Security Tips From the Experts
Active Directory (AD), a directory service developed by Microsoft for Windows domain networks, is most organizations’ primary store for employee authentication and identity management, and controls which assets / applications / systems a user has…Read More How to improve your organization’s Active Directory security posture
A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you remediate risk if your vendors fall short. And the right third-party security managem…Read More Buyer’s guide: Questions to ask when evaluating third-party security management platforms
Google recently unveiled the next evolution of Google Workspace, including new security and privacy capabilities to help users take advantage of trusted, cloud-native collaboration. In this interview with Help Net Security, Karthik Lakshminarayanan, Sr…Read More A closer look at Google Workspace privacy and data security
Other than a traditional SOC (security operations center) model, which offers continuous system monitoring to improve an organization’s security posture, there is also a virtual SOC solution, which offers the same capabilities, but is a web-based…Read More How do I select a virtual SOC solution for my business?
Cyber attacks are becoming a day-to-day struggle for businesses with the average cost of a breach estimated at $3.8M by the Ponemon Institute. Trends such as ransomware and the rapid acceleration of digital transformation are causing security conscious…Read More On-demand webinar: Demystifying MDR for security conscious buyers
An IT service management (ITSM) solution guarantees that IT processes and services are combined with the business goals of an organization, thus helping it thrive. To select a suitable ITSM solution for your business, you need to think about a variety …Read More How do I select an ITSM solution for my business?
Considering the breadth and diversity of attacks facing today’s organizations, it’s no wonder cybersercurity and IT professionals are relying on an ever expanding arsenal of new tools and technologies. A recent survey revealed that nearly 80% of organi…Read More Product Showcase: Acronis Cyber Protect
Look into the Certified Information Systems Security Professional (CISSP) official training course and walk away with a grasp of the topics covered in the CISSP Common Body of Knowledge (CBK). Hosted by an (ISC)² Authorized Instructor, the CISSP Webcas…Read More Webcast: Get a sneak peek inside the CISSP domains
Wwhat can security leaders do to make sure they’re prepared and hone their skills ahead of the next inevitable threat? Now, they can test themselves and their knowledge at a new website, The CISO Challenge. Launched by XDR provider Cynet, it aims to le…Read More New competition allows cybersecurity leaders to test their knowledge and skills
In this interview with Help Net Security, Adam Bennett, CEO at Red Piranha, discusses Extended Detection and Response and their flagship product – Crystal Eye XDR. We’ve been hearing a lot about XDR in the past year. What is it, and what se…Read More Crystal Eye XDR: Protect, detect and respond to threats from a single unified platform
Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, have so many constant drains on their attention – keeping their knowledge fr…Read More New community to gives cybersecurity leaders outside the Fortune 2000 a forum to collaborate
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shif to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies ne…Read More How do I select a DLP solution for my business?
While there is not one exact industry wide definition, threat modeling can be summarized as a practice to proactively analyze the cyber security posture of a system or system of systems. Threat modeling can be conducted both in the design/development p…Read More What is threat modeling and why should you care?
Even the best-laid plans can go astray, but you can get your certification goals back on track for success. Every (ISC)² member started out by committing to and passing one of our certification exams. No matter which certification you choose, you’ll fi…Read More Free certification Exam Action Plan from (ISC)²
Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is important to prevent or restrict unauthorized modification or distribution. This…Read More How do I select a DRM solution for my business?