security bloggers network
Bitdefender’s Business Insights Nominated at the 2018 Security Blogger Awards – Cast Your Vote!
Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there ...
Payment Gateways – What Are the Risks Lurking Around?
Online businesses of all sizes need to be able to accept payments today. This really is the only way in which you can buy and sell products and services without a physical ...
WannaCry after one year
In the news, Boeing (an aircraft maker) has been "targeted by a WannaCry virus attack". Phrased this way, it's implausible. There are no new attacks targeting people with WannaCry. There is either ...
SecurityEverAfter 2018-03-29 21:17:00
I recently posted the below on the SANS Internet Storm Center.The CIS Controls serve as a “prioritized set of actions to protect your organization and data from known cyber attack vectors.”. Embraced ...
Cloud Identity Management Competitors
There’s a new hot market in the identity and access management (IAM) space, and it is generating a great deal of interest from a variety of players. The cloud identity management competitors ...
Critical Drupal Core Vulnerability: What You Need to Know
Drupal is popular, free and open-source content management software. On March 28, the Drupal security team released patches for CVE-2018-7600, an unauthenticated remote code execution vulnerability in Drupal core. The vulnerability affects ...
What are the Features of Cloud IAM?
Identity and access management (IAM) has been a foundational part of IT for nearly two decades now. The world of IT has experienced dramatic changes during that time, yet legacy IAM solutions ...
Robert M. Lee & Jeff Hass’s ‘Little Bobby – Press Release’
via the superlative copy writing of Robert M. Lee and inimitable illustration work of Jeff Hass at Little Bobby Comics Permalink ...
Ready for tax season phishing scams?
As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take ...
