Laden...
January 27, 2019
Also known as Dreambot, this new variant can deploy GandCrab ransomware through Microsoft Word macros. Read more â¶
Multi-vector attacks target cloud-hosted technologies
15 secure coding practices to use in digital identity
Center for Internet Security releases Microsoft 365 benchmarks
How to land a digital forensics job
4 tips to mitigate Slack security risks
Back to basics: Malware explained
his white papers discusses some of the gaps in Office 365 and why third-party solutions to supplement or replace some of the native capabilities in Office 365 is a good idea. Read more â¶
Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure. Read more â¶
FROM OUR BUSINESS PARTNERS
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more â¶
Secure coding of any application or service is important, but it is vital in systems that process personal data. Read more â¶
Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization. Read more â¶
Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path. Read more â¶
A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces. Read more â¶
Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove itâor prevent it. Read more â¶
This white paper focuses on the Top 10 security threats facing organizations and what can be done to address them. Read more â¶
© 2024