Laden...
The day's top cybersecurity news and in-depth coverage
December 28, 2020
CSO editors from Australia, Germany, the United Kingdom and the US discuss how is security evolving in various parts of the world with continued remote work, the impact of data breaches and GDPR, the ransomware challenge, and other security trends for the year ahead. Read more â¶
States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected.
A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty years, and are only growing more prevalent and stronger.
Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources.
PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores
Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Hereâs what ethical hacking entails and the certifications and training you need to become an ethical hacker.
© 2024