When it comes to cloud security, know the difference between a great--or just okay--cloud vendor.
If you work with a service outside of its standard behavior, you may need to change its AppArmor profile mode.
Regenerating certificates may securely resolve authentication traffic, which is not being properly encrypted.
Some 83% of US security professionals said employees have accidently exposed sensitive customer information, according to an Egress survey.
Establishing sufficient cloud security is a complex challenge. Learn where your attention is best directed to achieve the best results.
Some 90% of CISOs are confused about their role in securing a SaaS environment, according to an Oracle and KPMG report.
RoboForm is an effective tool for creating and managing your website passwords. Learn how to use this password management tool.
In the old days, you just had redundant everything, and disaster recovery meant switching over. Not so in the world of cloud computing, security nightmares, and virtual everything.
If you're worried about privacy on your personal or company-issued mobile device, these 10 apps can help protect your data.
Despite a slight dip in the total number of breaches it was still a banner year for hackers focused on stealing data from websites, according to a Risk based Security report.
A trio of reports from ICS security firm Dragos point out what was learned in 2018 and give industrial security teams some tips for making 2019 less dangerous.
Keep local administrative accounts from being a malicious user's target by creating an invisible account.
Following revelations that Facebook, Google, Amazon, as well as purveyors of illicit content are abusing the Developer Enterprise Program, new reports show pirates are as well. Who's left?
Increasing pressure, hefty workloads, and budgetary deficits have significant negative effects on CISOs worldwide, according to a Nominet report.
Creating a do-it-yourself VPN that you manage and access on your own terms is not as difficult as you might think.
The Brave browser offers built-in protection against ad trackers, third-party cookies, and other potential threats to your privacy. Here's how to use it and tweak it.
Apple has less of an iron grip over iOS than first thought, as organizations are using the Developer Enterprise Program for apps that would not be allowed in the App Store.
Only one in three organizations say they are confident they can prevent data breaches, according to Balbix.
Apple is facing a lawsuit from a user claiming that two-factor authentication is a "waste of their personal time." Here's why businesses shouldn't ignore the security measure.
Blockchain technology is critical to business security, according to a Globant report. Here are the important blockchain terms to get accustomed with.
Cybercriminals are modifying wallet IDs copied to the clipboard in hopes that users will accidentally transfer funds to the wrong account.
Make your networks more secure by using an SSH to proxy through a jump host from one machine to another.
What VPN would you recommend for an Android user who uses public WiFi quite often and wants to buff up their security?
While the number of DDoS attacks have declined, they have become much more sophisticated, according to a Kaspersky Lab report.
Enterprises need to start preparing for a future without traditional passwords, according to LoginRadius.
The end of 2018 saw a spike in malicious attachments which businesses need to be wary of, according to a Proofpoint report.
Google's Confidential Computing Challenge aims to make it easier to achieve end-to-end encryption of data in the cloud.
After a data breach, 57% of consumers blame companies above everyone else, even hackers, for the event, according to an RSA Security report.
One in three companies is still unprepared for many potential cybersecurity threats, according to an eSecurityPlanet.com report.
Most people still lack an understanding of best practices for passwords and other security measures, Google found.
The US government will not be able to mitigate a cyber-enabled economic warfare attack without help from the private sector, according to a report from FDD and the Chertoff Group.
State-sponsored groups are leveraging weaknesses in IoT devices to build botnets, and attacking private industry and public infrastructure in attacks, according to a Booz Allen report.
You can easily prevent unwanted users and attacks from gaining access to your CentOS 7 server.
Learn about these uniquely dangerous vulnerabilities as TechRepublic's James Sanders discusses up-to-date info on the latest variants and best mitigation strategies to minimize performance impact.
If you run NGINX and want to use free certificates, it's possible with Let's Encrypt.
Open-source, industry standard specifications are available to protect your business, but real-world deployment is still lower than optimal.
Staying up to date on Spectre and Meltdown can be challenging. This guide includes in-depth explanations about these uniquely dangerous security vulnerabilities and the best mitigation solutions.
From counterfeit tickets to live streaming deals, Super Bowl 53 can generate a slew of cybersecurity risks. Learn how to protect yourself.
Cyberattacks are increasing, and your organization may be making itself a high-profile target for attackers, according to a Radware report.
The CookieMiner malware attempts to extract credentials for cryptocurrency wallets and exchanges, as well as stored password and credit card information.
What happens when you get kicked out of Apple's Enterprise Developer program? Facebook is finding out the hard way.
VMware host servers require advanced software to manage them en masse. Admins can restrict access using AD services to authenticate and manage user account security.
MSSPs provide flexibility, expertise, and efficiencies in scale. Learn about more advantages below.
The potency of DDoS attacks lies in the number of packets being sent rather than the relative bandwidth involved in the attack.
Apple iPhone users discovered a serious FaceTime bug that lets you hear audio from another iPhone or even view live video without the recipient's knowledge.
Despite the wide-ranging effects of the Facebook data privacy scandal, only one-fifth of people are concerned over privacy issues related to social media use, according to a Yubico study.
Tom Merritt shares five ways companies can request data from their consumers--and actually get it.
Ahead of the 2020 Tokyo Olympic Games, the Japanese government is planning to access unsecured Internet of Things devices to identify users and request they change their passwords.
Jack Wallen shows you how you can use SSH to proxy through a jump host from one machine to another.
There are several actions companies can take to improve overall employee awareness about security. View the top five below.
Popular application ES File Explorer for Android has a significant vulnerability, putting your data at risk. Learn what's involved and how to remediate the threat.
Interest in bug bounty programs is exploding, as companies look to crowdsourcing to combat hackers. But several misconceptions remain.
Make using SSH key authentication a snap with the new ssh-agent feature found in KeePassXC.
Using Google App Engine to mask the destination of links is a staggeringly easy way to conduct a phishing campaign, but Google claims it is not their problem.
Multicloud is much more popular than hybrid cloud, with only 33% of professionals using a hybrid model, according to a Kentik report.
Security updates for the lifespan of a given device are critical to protecting your connected device against hackers, according to a Barracuda report.
These apps will help keep your enterprise safe from malware and other cybersecurity threats.
With the CISO at the table, organizations must focus on products, processes, and people to stay secure, according to the executive director of the National Cyber Security Alliance.
Mac admins or users savvy around Terminal can easily reset a password and have the affected account back to work within minutes.
When criminals use technology to propagate social engineering attacks, securing your organization can become complicated. Here's what you need to know about phishing and spearphishing.
The new malware is being propagated on P2P networks, and demands a ransom equivalent to $725 USD, according to McAfee Labs.
Jack Wallen shows you how to lock out users after failed login attempts in CentOS 7.
More than 70% of tech professionals said security spending has increased in the past year, according to a Ping Identity report.
With OpenLDAP, you can manage users on a centralized directory server and then configure each desktop to authenticate to that server.
Phishers often spoof major tech brands in their efforts to gain payments from individuals and businesses, according to a Vade Secure report.
Old school but effective, hackers are shifting aware from in-your-face ransomware to attacks that are much more subtle.
Selling personal information and compromised accounts of popular Instragram users has become more lucrative than ransomware and cryptojacking campaigns.
When addressing security vulnerabilities, enterprises should focus on those with publicly available exploit code, according to a Kenna Security report.
One common criticism of bug bounty programs is that very few hackers actually make money. Not only is this untrue, but it misses the point.
Blockchain may finally be ready to move from hype to reality, with continued IoT integrations and tokenization, according to KPMG.
The Redmond giant is keenly interested in remote code execution and privilege escalation flaws.
Without a formal plan or policy, wearables may introduce your company to a security breach.
An 87GB dump of email addresses and passwords containing almost 773 million unique addresses and just under 22 million unique passwords has been found.
If your network doesn't allow connections into the default VNC port 5901, you can tunnel it through SSH.
Data privacy is no longer a nice-to-have security commodity, but a must-have commodity.
Refined malware payloads from Chinese threat actor Rocke Group are sidestepping security tools to install cryptocurrency miners on cloud systems.
Managed Security Service Providers can alleviate many of the headaches suffered by in-house security, but they need to remain nimble and focused to retain their edge.
Despite the existence of patches, the proliferation of unpatched installations are enticing targets for malicious actors, according to a WhiteHat report.