Category: Security Resources and Information from TechTarget

8 blockchain security risks to weigh before adoption

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: 8 blockchain security risks to weigh before…

Europol, Ukraine police arrest alleged ransomware ringleader

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Europol, Ukraine police arrest alleged ransomware ringleader

timing attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: timing attack

Hybrid cloud connectivity best practices and considerations

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Hybrid cloud connectivity best practices and considerations

Threat actors targeting critical OwnCloud vulnerability

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Threat actors targeting critical OwnCloud vulnerability

4 data loss examples keeping backup admins up at night

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: 4 data loss examples keeping backup admins…

possession factor

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: possession factor

How do cybercriminals steal credit card information?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How do cybercriminals steal credit card information?

15 benefits of outsourcing your cybersecurity operations

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: 15 benefits of outsourcing your cybersecurity operations

An introduction to IoT penetration testing

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: An introduction to IoT penetration testing

SBOM formats compared: CycloneDX vs. SPDX vs. SWID Tags

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: SBOM formats compared: CycloneDX vs. SPDX vs.…

8 ways to cope with cybersecurity budget cuts

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: 8 ways to cope with cybersecurity budget…

Automated Clearing House fraud (ACH fraud)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Automated Clearing House fraud (ACH fraud)

LockBit observed exploiting critical ‘Citrix Bleed’ flaw

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: LockBit observed exploiting critical ‘Citrix Bleed’ flaw

VMware discloses critical, unpatched Cloud Director bug

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: VMware discloses critical, unpatched Cloud Director bug

How to protect your organization from IoT malware

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to protect your organization from IoT…

cardholder data environment (CDE)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: cardholder data environment (CDE)

TikTok bans explained: Everything you need to know

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: TikTok bans explained: Everything you need to…

What should admins know about Microsoft Entra features?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: What should admins know about Microsoft Entra…

Lace Tempest exploits SysAid zero-day vulnerability

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Lace Tempest exploits SysAid zero-day vulnerability

emergency communications plan (EC plan)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: emergency communications plan (EC plan)

FBI: Ransomware actors hacking casinos via third parties

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: FBI: Ransomware actors hacking casinos via third…

Atlassian Confluence vulnerability under widespread attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Atlassian Confluence vulnerability under widespread attack

threat detection and response (TDR)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: threat detection and response (TDR)

dark web monitoring

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: dark web monitoring

multisig (multisignature)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: multisig (multisignature)

Common Vulnerabilities and Exposures (CVE)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Common Vulnerabilities and Exposures (CVE)

9 secure email gateway options for 2024

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: 9 secure email gateway options for 2024

authentication

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: authentication

No patches yet for Apple iLeakage side-channel attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: No patches yet for Apple iLeakage side-channel…

SEC charges SolarWinds for security failures, fraud

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: SEC charges SolarWinds for security failures, fraud

How to use Managed Google Play with Microsoft Intune

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to use Managed Google Play with…

privacy impact assessment (PIA)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: privacy impact assessment (PIA)

supercookie

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: supercookie

Top 12 IT security frameworks and standards explained

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Top 12 IT security frameworks and standards…

compliance officer

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: compliance officer

integrated risk management (IRM)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: integrated risk management (IRM)

Cisco IOS XE instances still under attack, patch now

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Cisco IOS XE instances still under attack,…

1Password stops attack linked to Okta breach

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: 1Password stops attack linked to Okta breach

Top 10 tips for employees to prevent phishing attacks

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Top 10 tips for employees to prevent…

soft token

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: soft token

North Korean hackers exploit critical TeamCity vulnerability

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: North Korean hackers exploit critical TeamCity vulnerability

CISA, NSA, FBI publish phishing guidance

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: CISA, NSA, FBI publish phishing guidance

Structured Threat Information eXpression (STIX)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Structured Threat Information eXpression (STIX)

How to build a content governance model

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to build a content governance model

antispoofing

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: antispoofing

Mandiant: Citrix zero-day actively exploited since August

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Mandiant: Citrix zero-day actively exploited since August

Google Authenticator

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Google Authenticator

How to conduct a cyber-resilience assessment

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to conduct a cyber-resilience assessment

Cisco IOS XE zero-day facing mass exploitation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Cisco IOS XE zero-day facing mass exploitation

Secure Sockets Layer certificate (SSL certificate)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Secure Sockets Layer certificate (SSL certificate)

Allowlisting vs. blocklisting: Benefits and challenges

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Allowlisting vs. blocklisting: Benefits and challenges

Best practices to conduct a user access review

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Best practices to conduct a user access…

SEO poisoning (search poisoning)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: SEO poisoning (search poisoning)

Ransomware gang targets critical Progress WS_FTP Server bug

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Ransomware gang targets critical Progress WS_FTP Server…

Why fourth-party risk management is a must-have

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Why fourth-party risk management is a must-have

security awareness training

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: security awareness training

Microsoft Windows Credential Guard

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Microsoft Windows Credential Guard

Microsoft tackles three zero-days for October Patch Tuesday

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Microsoft tackles three zero-days for October Patch…

authentication, authorization and accounting (AAA)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: authentication, authorization and accounting (AAA)

CSSLP (Certified Secure Software Lifecycle Professional)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: CSSLP (Certified Secure Software Lifecycle Professional)

risk-based authentication (RBA)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: risk-based authentication (RBA)

Microsoft Schannel (Microsoft Secure Channel)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Microsoft Schannel (Microsoft Secure Channel)

IBM launches new AI-powered TDR Services

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: IBM launches new AI-powered TDR Services

blockchain

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: blockchain

risk assessment

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: risk assessment

Critical Atlassian Confluence zero-day flaw under attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Critical Atlassian Confluence zero-day flaw under attack

Okta debuts passkey support to combat account compromises

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Okta debuts passkey support to combat account…

Ransomware disrupts hospitality, healthcare in September

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Ransomware disrupts hospitality, healthcare in September

Whistleblower Protection Act

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Whistleblower Protection Act

Openwall patches 3 of 6 Exim zero-day flaws

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Openwall patches 3 of 6 Exim zero-day…

multifactor authentication

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: multifactor authentication

How to land a corporate board seat as a CISO

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to land a corporate board seat…

5 common browser attacks and how to prevent them

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: 5 common browser attacks and how to…

How to use Wireshark to sniff and scan network traffic

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to use Wireshark to sniff and…

How to use Wireshark to sniff and scan network traffic

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to use Wireshark to sniff and…

Cisco patches zero-day vulnerability under attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Cisco patches zero-day vulnerability under attack

How to develop a cybersecurity strategy: Step-by-step guide

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to develop a cybersecurity strategy: Step-by-step…

Protected Extensible Authentication Protocol (PEAP)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Protected Extensible Authentication Protocol (PEAP)

principle of least privilege (POLP)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: principle of least privilege (POLP)