certificates credentials

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by ...
Public key cryptography - Diffie-Hellman Key Exchange (full version)

What is Public Key Cryptography?

Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are symmetric. Two ...
SpongeBob SquarePants | Naughty Nautical Neighbours | Nickelodeon UK

Man-in-the-middle (MITM) attacks: explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How does a man-in-the-middle attack work? The attacker sets up rogue hardware ...
cloud security

Cloud Audit Protection Against Security Threats

The post Cloud Audit Protection Against Security Threats appeared first on CCSI ...
Cyber Aware With Micro-Learning

Train Your Employees to Be Cyber Aware With Micro-Learning

Micro-learning has been proven to increase security awareness and retention Regardless of company size—whether a large enterprise or small mom-and-pop shop—being the victim of a cyberattack is a real, potentially devastating threat ...
Security Boulevard
Moody's

Trustwave Report: Threat Containment Getting Better

Given much of the publicity that is routinely attached to every breach disclosure these days, it’s easy to be pessimistic about the overall state of cybersecurity. But a 2018 breach report from ...
Security Boulevard
Push Notifications

The Evolving Impact of Cybersecurity Threats

As security threats evolve and adapt, so, too, must organizations’ response to them Infosec spending is on track to reach $124 billion this year. According to research firm Gartner, this marks an ...
Security Boulevard

Scranos Rootkit Operation Turns Global; Enterprises to Improve Security Posture

Sophisticated threats remain one of the main concerns in enterprises today. As environments grow in complexity, malware actors find innovative ways to infiltrate overlooked entry points in the network, hiding behind the ...
privacy

Among Cybersecurity Pros, Security Paranoia Runs Deep

Cybersecurity pros are a paranoid bunch, at least according to a survey Lastline conducted at the RSA Conference in March. It makes sense when you think about it. After all, these are ...
Security Boulevard
Insider Threats: Fear for Small Businesses

Insider Threats: A Big Fear for Small Businesses

In the list of things that keep SMB leaders awake at night, insider threats rate at the top. Here’s why this threat is far bigger for smaller companies. A recent report finds ...
Security Boulevard
Loading...