Laden...
April 17, 2020
Attacker targeted Windows systems to hijack cryptocurrency transactions, and was able to evade anti-typosquatting measures. Read more â¶
Work from home, phase 2: What comes next for security?
New platform AttackerKB gives defenders more context on vulnerabilities
How to lock down Remote Desktop Protocol servers
Trump administration moves to revoke China Telecom's US licenses on security grounds
How Prudential measures its security culture to identify risk
8 key security considerations for protecting remote workers
Join John Thompson, Chairman of Microsoft; Bhavin Shah, CEO of Moveworks; and a panel of leading CIOs as they break down the tools theyâre leveraging to support their remote workforce. Read more â¶
Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation. Read more â¶
DEALPOST
GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more â¶
Real-world input from pen testers and other members of the security community aims to help defenders make better assessments of vulnerability risks. Read more â¶
Make sure you've made all the proper settings to secure remote desktop protocol (RDP) to best protect your Windows network when supporting remote workers. Read more â¶
A legal filing claims China Telecom is in violation of federal and state cybersecurity and privacy laws, but evidence is redacted. Read more â¶
The financial services firm finds that employee confidence in how they would respond to a given security scenario is a better indicator of risk than their security knowledge. Read more â¶
Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more â¶
A Roundup of the 10 Biggest, Boldest, and Most Brazen Business Email Compromise Scams of 2020 and 2019. Read more â¶
© 2024