Laden...
The day's top cybersecurity news and in-depth coverage
June 30, 2021
Microsoft has hardened authentication for its DCOM Server in response to a vulnerability. Check for the impact on your network now before the change becomes permanent. Read more â¶
With the shift to hybrid working models and a mix of in-office and remote work, how concerned are you about unmanaged endpoints? How are you increasing remote work security? Share your thoughts in this short survey! As our thanks, we'll give you the report and you can enter to win a $100 gift card.
The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.
Some state legislatures are debating bills that could limit or ban ransom payments. A better option, experts say, is mandatory reporting of ransomware attacks.
OSINT (open-source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.
Sensitive company and personal data often leaves organizations on disposed devices. An auditable chain of custody that shows data destruction is essential for any ITAD program.
CSO50 award-winning program STEMatch makes cybersecurity education and careers more accessible thanks to private and public sector support.
© 2024