Voter Privacy and the US Election

In episode 144 for October 26th 2020: Voter privacy and what you need to know about protecting your private information during the upcoming US election. ** Links mentioned on the show ** ...
f5 Honeypot Network Forensics

Honeypot Network Forensics

NCC Group recently released a 500 MB PCAP file containing three months of honeypot web traffic data related to the F5 remote code execution vulnerability CVE-2020-5902. In a blog post the NCC ...
f5 Honeypot Network Forensics

Honeypot Network Forensics

NCC Group recently released a 500 MB PCAP file containing three months of honeypot web traffic data related to the F5 remote code execution vulnerability CVE-2020-5902. In a blog post the NCC ...
Choosing the Right VPN for Your Business

Choosing the Right VPN for Your Business

VPN Usage has been critical during the coronavirus pandemic. Virtual Private Networks have allowed employees to safely connect to corporate networks regardless of location. This technology was foundational for businesses to safely ...

TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption

In episode 143 for October 19th 2020: Microsoft gets creative to help take down the TrickBot botnet, details on how attackers have been using VPN flaws to attack election support systems, and ...
CISA and FBI Observed APT Groups Targeting State Networks Related to US Election Systems

CISA and FBI Observed APT Groups Targeting State Networks Related to US Election Systems

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued an advisory after spotting advanced persistent threat (APT) actors exploiting multiple legacy vulnerabilities combined with a newer privilege escalation vulnerability—CVE-2020-1472—in Windows ...
Securing Devices at Home and Work

Securing Devices at Home and Work

It's National Cybersecurity Awareness Month! We're sharing tips to secure your devices at home and at work so that you can #BeCyberSmart. The post Securing Devices at Home and Work appeared first ...

Five Cloud Security Considerations for CISOs

Discover How You Can Protect Users and the Organization in Today’s New Normal The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower ...
https://www.avatier.com/blog/wp-content/uploads/2019/07/blog-Self-Assess-Your-MFA-Implementation-in-5-Steps-copy.jpg

Multi-Factor Authentication for Okta VPN

When it comes to authentication security, one of the simplest upgrades you can make that will drastically improve your network’s safety is to implement Multi-Factor Authentication (MFA). Simply put, MFA is any ...
access

Applying Enterprise Access Lessons From COVID-19

The pandemic showed that VPNs were no longer the gold standard when it came to network access COVID-19 is impacting our world in many ways. One likely consequence of the pandemic will ...
Security Boulevard