Laden...
May 28, 2020
The day's top cybersecurity news and in-depth coverage
Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network. Read more â¶
Explore four proven ways to gain visibility into who and what is connected to your networks so you can reduce your attack surface, eliminate network blind spots, and strengthen access control with Gigamon and Fortinet.
Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.
Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.
As systems and applications grow, the number of false positives can rapidly increase and place a serious burden on developers and security teams, with negative consequences for the development process, application security, and business results.
Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.
Attackers are using web shells to mimic legitimate files on web servers and infect them with malware. Hereâs how to prevent it.
Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but donât actually improve security. Rooting these out can save considerable time and money -- and make your organization safer.
Follow these 10 best practices to limit risks to your organization.
© 2024