Laden...
January 07, 2019
Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. Read more â¶
WordPress security: Top tools and best practices
How Facebook's privacy woes might change the rules of the road in 2019
5 steps to simple role-based access control (RBAC)
How to set Microsoft Office 365 ATP policies to block malicious URLs
2019 will be the year of cloud-based cybersecurity analytics/operations
Hacking skills on display at the 35th Chaos Communication Congress
6 reasons biometrics are bad authenticators (and 1 acceptable use)
Leveraging IT efficiencies and increased agility to deliver new customer experiences and revenue growth. Read more â¶
Following a string of data privacy and protection missteps, Facebook faces potential backlash from legislators and consumers that could affect all companies that process consumer data. Read more â¶
FROM OUR BUSINESS PARTNERS
RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more â¶
RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role. Read more â¶
Windows Advanced Threat Protection allows admins to set link filters for email messages and attachments in Outlook. Read more â¶
Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud. Read more â¶
35th Chaos Communication Congress had hackers spoofing a vein authentication system with a wax hand, showing off hardware wallet hacks, and outlining the first UEFI rootkit. Read more â¶
Biometrics-only authentication is inaccurate, hackable and far from foolproof. Read more â¶
Reducing Technical Debt and Optimizing It Cost with IT Modernization Initiatives Read more â¶
© 2025