Linux vulnerabilities: How unpatched servers lead to persistent backdoors

| | General Security
Vulnerability management is a challenge Humans make mistakes, software has bugs and some of these bugs are exploitable vulnerabilities. The existence of vulnerabilities in software is not a new... Go on to ...

Exploiting leading antivirus software: RACK911 Labs details vulnerabilities

| | General Security
How an antivirus works Antivirus programs are designed to keep your computer safe from malware and other malicious content. In order to minimize the damage that a potentially malicious file can pose ...

CMMC Level 3 Control – Email Sandboxing (SI.3.220)

An overview for this control states an organization should utilize sandboxing to detect or block potentially malicious email.  The action can prevent malicious files from entering the network and should be document ...

CMMC Level 3 Control – Email Sandboxing (SI.3.220)

An overview for this control states an organization should utilize sandboxing to detect or block potentially malicious email.  The action can prevent malicious files from entering the network and should be document ...

Top 6 cybersecurity books for IT auditors

| | General Security
Introduction Like many other information security professionals, you probably have a library of books on the topic of your career choice. Not only that, but like many others, yours is probably not ...

National Counterintelligence and Security Center: 5 priorities for 2020

| | General Security
Introduction: NCSC’s role For years, the United States has faced increasingly aggressive and complex threats from foreign intelligence entities (FIEs) and nation-states, as well as from a range of... Go on to ...

How privacy agreements impact data privacy for business users: Slack, Zoom and Microsoft Teams

| | General Security
The growing interest in third-party collaboration apps The growing trend toward remote work is changing how people communicate in the workplace. Cloud-based collaboration apps and videoconferencing... Go on to the site to ...

Physical Access Control

How many managers think that it makes no sense to spend money protecting information that can be reconstructed? What can really happen? Theoretically, anything and everything from the abuse of... Go on ...

RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings ...

The False Claims Act and cybersecurity: Are third-party vendors putting you at risk?

| | General Security
Introduction A government supplier law written over a century ago may seem outdated in the digital age, but it may be putting your company at risk. Recent court rulings related to the ...