Laden...
The day's top cybersecurity news and in-depth coverage
July 08, 2020
Even large companies like Honda can fall victim to a targeted ransomware attack. Take these steps to harden your Windows network against them. Read more â¶
A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats.
Attackers use privilege escalation flaws to gain access to systems and applications. Patching and monitoring are the most important ways to stop them.
California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
The threat landscape is constantly evolving, and people continue to be the number one target for attackers. Having a comprehensive, data-driven security awareness program in place is more important than ever to reduce your people-centric security risk and build a strong last line of defense.
The IPv6 protocol affects the security of your network even if you haven't deployed it internally. Here are the most important points every security team needs to understand about the protocol.
Cybersecurity is now a board-level issue, but many organizations still struggle to get security risk management right.
Split tunnel virtual private networks have some advantages for supporting remote workers connecting to a Windows network, but they come with risks. Here's how to best protect your network.
© 2024