The day's top cybersecurity news and in-depth coverage
June 23, 2020
If you're ignoring or have disabled Windows Firewall, you might be missing out on some good, basic protections that are easy to set up and maintain. Read more â¶
The surge in remote work has rekindled interest in brute-force attacks, but a few simple steps can make your organization less of a target for them.
CISOs must anticipate burgeoning needs for distributed security scale, intelligence, and self-service.
Breach concerns, data privacy regulations and new responsibilities for managing risk are elevating the security leadership role
Staffing needs remain high, forcing companies to adapt their recruiting and onboarding practices â often for the better.
Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.
Read the report to gain valuable perspective on the state of software security today.
Got time on your hands during the COVID-19 crisis? Here are some great free or cheap resources to add new cybersecurity skills to your resume.
The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure.