| Security Blog News |
| Showing 'Security Blog News' from 41 to 50|
| |8 Steps To Enhance Government Agencies Security Posture Given the heterogeneous architectures of critical state and local systems, its imperative we learn from the security exposures of other critical infrastructure and pledge to be better
| |How To Better Protect Your Organization Against Email Threats As most generic spam now gets blocked, attackers have turned to more targeted, personalized phishing emails to reel in their victims, according to security firm Trustwave.
| |Zoom Is Introducing This New Feature In Its Bid To Banish Zoom Bombing A new button allowing meeting participants to report users is Zooms latest attempt to bring its security features up to scratch.
| |COVID-19 Contact Tracing: The Tricky Balance Between Privacy And Relief Efforts As more governments consider the use of contact tracing apps to prevent the spread of coronavirus, researchers say privacy will have to be at the forefront of efforts in order for civilians to use it.
| |Security Teams Want New Tools But Lack The Budget To Experiment A survey of 100 security professionals found that traditional defenses are prone to failure.
| |COVID-19 Lockdowns Are Causing A Huge Spike In Data Breaches Fears over data leaks from remote workers are not only founded, theyre much worse than anticipated, said the International Association of IT Asset Managers.
| |Is COVID-19 Intensifying The Need For Security Staffing? Overall, security practitioners should find themselves in a better working situation than many other professionals. However, we are not immune.
| |Ransomware: Why SMBs Are Especially Vulnerable To Attacks Many small- and mid-sized business owners say they lack of the time or resources to effectively battle ransomware, according to a survey from security provider Infrascale.
| |Bad Bots Now Account For Almost A Quarter Of All Website Traffic Designed to mimic legitimate users, these bots allow attackers to mine data, brute force login credentials, and harvest personal information, according to Imperva.
| |7 Steps To Avoid The Top Cloud Access Risks Securing identities and data in the cloud is challenging, but a least-privilege access approach helps.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |