All government domain owners are instructed to take immediate steps to strengthen the security of their DNS servers following a successful hacking campaign.
Google Alphabet incubator Jigsaw says knowing how to spot a phish plus two-factor authentication are the best defenses against falling for a phishing email.
Adversaries took advantage of the large attack surface of large communications networks to spread small volumes of junk traffic across hundreds of IP prefixes in Q3 2018, Nexusguard says.
In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.
Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations' total email traffic is generated internally by users. And, of course, attackers know this.
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.