Laden...
The day's top cybersecurity news and in-depth coverage
September 11, 2020
Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization. Read more â¶
COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.
The popular messaging and video conferencing platform comes with security and privacy risks. These are your limited native and third-party options for protecting users and data.
As more employees work from home, attackers have more endpoints to target. These unpatched vulnerabilities in remote access tools and Windows makes their job easier.
The Cybersecurity Maturity Model Certification provides a means for the DoD to certify the security capabilities of its contractors, but it's a good way to assess the cybersecurity maturity for all companies.
Yes, the cloud offers many security advantages over on-premises, especially for smaller organizations, but only if you avoid these mistakes around cloud configuration, monitoring and patching.
© 2024