Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

<!-- Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95 | InfoWorld

IDG Contributor Network: How hybrid IT impacts identity management

Hybrid IT is disrupting many processes in IT organizations and contributing to organizational complexity. That complexity extends to identity management, which allows organizations to understand not only who has access...

Simple tips to keep your devices secure when you travel

CSO Online | Jul 25, 2017 CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black...

Ransomware soars in 2016, while malware declines

A global cyberthreat report released Tuesday found that 2016 was a mixed bag: malware was down slightly, but ransomware attacks soared, up 167 times the number recorded in 2015.In addition...

What an Apple phishing attack looks like | Salted Hash Ep 32

CSO Online | May 16, 2018 How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like,...

Notorious iOS spyware has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.Called Chrysaor, the Android variant can...

Tips for negotiating with cyber extortionists

Paying ransom to a cyber extortionist holding enterprise data hostage might seem like a poor idea in principle but sometimes it might the best, or even only, option for extricating...

Nmap security scanner gets new scripts, performance boosts

The Nmap Project just released the Holiday Edition of its open source cross-platform security scanner and network mapper, with several important improvements and bug fixes. include Npcap...

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating...

Cloud security: Inside the shared responsibility model

In the latest major cloud security foul-up, Capital One suffered a data breach, which affected 100 million people in...

STAY CONNECTED

2,973,060FollowersFollow
13,460,346FollowersFollow
6,580SubscribersSubscribe