Laden...
The day's top cybersecurity news and in-depth coverage
October 27, 2020
Attackers could use the Windows Bad Neighbor vulnerability to perform remote code execution or create buffer overflows. Patches and workarounds are available. Read more â¶
Email attacks are getting more sophisticated, impersonating your colleagues and trusted contacts. Cyber AI can tell friend from foe, stopping the most convincing malicious emails in their tracks.
Certified Information Security Manager, or CISM, is a certification for advanced IT professionals who want to demonstrate that they can develop and manage an infosec program at the enterprise level.
Enlightening and inspiring sessions. Winning projects and initiatives featured in our information-packed, TED-like format of 18-minute sessions cover topics such as: access and identity management, critical infrastructure, new best practices for hiring and career development, #data loss prevention and recovery, managing third-party #risk, #security awareness and training. Attend November 17-19 and learn more. Register now.
CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.
Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.
Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?
© 2024