Security Wire Weekly
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
Categories: Security Wire Weekly
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them.
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them.
Categories: Security Wire Weekly
Check out the latest security news from the Informa TechTarget team.
Check out the latest security news from the Informa TechTarget team.
Categories: Security Wire Weekly
Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages.
Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages.
Categories: Security Wire Weekly
AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about.
AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about.
Categories: Security Wire Weekly
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
Categories: Security Wire Weekly
Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization.
Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization.
Categories: Security Wire Weekly
Mobile compliance now requires governance over how sensitive data is accessed across managed and personal devices. Here are practical steps for sustainable enterprise compliance.
Mobile compliance now requires governance over how sensitive data is accessed across managed and personal devices. Here are practical steps for sustainable enterprise compliance.
Categories: Security Wire Weekly
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.
Categories: Security Wire Weekly
CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
Categories: Security Wire Weekly
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk.
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk.
Categories: Security Wire Weekly
Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office.
Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office.
Categories: Security Wire Weekly
As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.
As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.
Categories: Security Wire Weekly
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
Categories: Security Wire Weekly
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
Categories: Security Wire Weekly
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.
Categories: Security Wire Weekly
