Laden...
April 20, 2020
How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner. Read more â¶
Work from home, phase 2: What comes next for security?
RubyGems typosquatting attack hits Ruby developers with trojanized packages
SOC analyst job description, salary, and certification
Threat modeling explained: A process for anticipating cyber attacks
How to lock down Remote Desktop Protocol servers
The 15 biggest data breaches of the 21st century
OâReilly online learning contains information about the trends, topics, and issues tech leaders need to watch and explore. Read more â¶
Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation. Read more â¶
DEALPOST
GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more â¶
Attacker targeted Windows systems to hijack cryptocurrency transactions, and was able to evade anti-typosquatting measures. Read more â¶
A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. Read more â¶
Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources. Read more â¶
Make sure you've made all the proper settings to secure remote desktop protocol (RDP) to best protect your Windows network when supporting remote workers. Read more â¶
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory. Read more â¶
Skillup your Employees, Customers and Partners with myTrailhead Read more â¶
© 2024