WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions

WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions

The post WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions appeared first on Digital Defense ...
Insider Series: Law Firms and Cybersecurity – What’s Changed?

Insider Series: Law Firms and Cybersecurity – What’s Changed?

The public nature of the legal system makes law firms particularly vulnerable to a growing number of cybersecurity risks. Law firms have unique access to highly confidential client information and as a ...
threats cyberattacks virtual appliances

As Cyberattacks Intensify, Orgs Don’t Report Incidents

It comes as no surprise that most IT security leaders believe that cyberattacks will intensify in the next year. What is surprising (and troubling) is that many keep attacks to themselves while ...
Security Boulevard
best anti-virus

Beware fake anti-virus reviews

You need anti-virus and there is a load of advice online about which to buy. Who can you trust? Some anti-virus reviewers know what they are talking about. Others don’t. Some are ...
vulnerability-resignation

The Great Resignation Creates Great Vulnerabilities – Techstrong TV

Ben Smith, Field CTO at NetWitness, and Charlene discuss how the Great Resignation creates “The Great Vulnerability” in organizations. The video is below followed by a transcript of the conversation. Charlene O’Hanlon: ...
Security Boulevard
PAM is a Process, Not Just a Tool

PAM is a Process, Not Just a Tool

Privileged accounts are a necessary evil. They provide select users the capabilities to perform functions necessary to maintain the organization’s technology infrastructure. But, in the wrong hands, they are among the most ...
Identifying a ‘Material Cyber Event’ - an illustration of a spider on top of a shield, boxes of files, and a brick wall on fire against a dark blue background. The background is overlayed with binary code.

Identifying a ‘Material Cyber Event’

The SEC wants publicly traded companies to disclose “material cybersecurity incidents” within four days of determining that an incident would indeed be material to investors. So, um, what does that mean? The ...
Five Things You Need to Start Right Now to Get Ready for PCI DSS v4.0

Five Things You Need to Start Right Now to Get Ready for PCI DSS v4.0

The game, Mrs. Hudson, is ON! Version 4.0 of the PCI DSS has been published, along with the Report on […] ...

How to Solve the Password Problem

An Overhaul in Password Security Passwords aren’t going anywhere. Despite the buzz that biometrics and MFA are holistic solutions, passwords are a ubiquitous, crucial layer for authentication—and they’re low-cost and simple, too.  That’s ...
Iran cybersecurity attack Security

Three Iranian Nationals Charged in Critical Services Scheme

A trio of Iranian nationals have been indicted for participating in what FBI director Christopher Wray called “a multi-year scheme to compromise the networks of hundreds of companies, organizations and institutions, many ...
Security Boulevard