General Security

8 Best WordPress Security Plugins

Over a third of websites (37%) are hosted on WordPress, making it the world’s most popular content management system (CMS).…

3 months ago

Linux vulnerabilities: How unpatched servers lead to persistent backdoors

Vulnerability management is a challenge Humans make mistakes, software has bugs and some of these bugs are exploitable vulnerabilities. The…

3 months ago

Exploiting leading antivirus software: RACK911 Labs details vulnerabilities

How an antivirus works Antivirus programs are designed to keep your computer safe from malware and other malicious content. In…

3 months ago

CMMC Level 3 Control – Email Sandboxing (SI.3.220)

An overview for this control states an organization should utilize sandboxing to detect or block potentially malicious email.  The action…

3 months ago

Top 6 cybersecurity books for IT auditors

Introduction Like many other information security professionals, you probably have a library of books on the topic of your career…

4 months ago

National Counterintelligence and Security Center: 5 priorities for 2020

Introduction: NCSC’s role For years, the United States has faced increasingly aggressive and complex threats from foreign intelligence entities (FIEs)…

4 months ago

How privacy agreements impact data privacy for business users: Slack, Zoom and Microsoft Teams

The growing interest in third-party collaboration apps The growing trend toward remote work is changing how people communicate in the…

4 months ago

Physical Access Control

How many managers think that it makes no sense to spend money protecting information that can be reconstructed? What can…

4 months ago

RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections,…

5 months ago

The False Claims Act and cybersecurity: Are third-party vendors putting you at risk?

Introduction A government supplier law written over a century ago may seem outdated in the digital age, but it may…

5 months ago