Skip to content

General

All discussions that don't fall under a specific category

3.7k Topics 3.7k Posts
  • 5 phases of zero trust in cloud adoption

    1
    0 Votes
    1 Posts
    20 Views
    CerberusC

    Organizations looking to expand their cloud adoption can incorporate zero trust principles to manage identity and access across their network.

    https://www.securitymagazine.com/articles/98180-5-phases-of-zero-trust-in-cloud-adoption

  • 0 Votes
    1 Posts
    17 Views
    CerberusC

    Young security professionals can win scholarships of up to $3,000 for security training and education, certification programs, industry events and more from the Security Industry Association (SIA).

    https://www.securitymagazine.com/articles/98178-applications-open-for-sia-rise-young-security-professionals-scholarship

  • 0 Votes
    1 Posts
    23 Views
    CerberusC

    A master data management approach can help organizations prepare today for tomorrow’s data privacy, compliance and regulatory challenges.

    https://www.securitymagazine.com/articles/98176-rising-to-the-challenge-of-modern-data-security-and-growing-privacy-regulations

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    The 2022 Honeywell Industrial Cybersecurity USB Threat Report found elevated threat levels regarding USB-borne cyberattacks on the industrial sector.

    https://www.securitymagazine.com/articles/98177-usb-cyberattacks-pose-a-threat-to-manufacturing-and-industrial-sector

  • 0 Votes
    1 Posts
    21 Views
    CerberusC

    Unauthorized enterprise Software as a Service (SaaS) applications can present cybersecurity risks to a business. Gaining visibility into SaaS apps is key.

    https://www.securitymagazine.com/articles/98173-how-to-secure-organizational-saas-and-increase-third-party-visibility

  • 0 Votes
    1 Posts
    12 Views
    CerberusC

    Software Bill of Materials (SBOM) are a critical tool in protecting enterprise and government organizations from software supply chain security threats.

    https://www.securitymagazine.com/articles/98171-6-areas-to-watch-in-the-software-bill-of-materials-evolution

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    Ensure safety and security, business continuity and more with three simple emergency preparedness tips.

    https://www.securitymagazine.com/articles/98169-3-safety-tips-to-prepare-for-wildfire-season-2022

  • 0 Votes
    1 Posts
    17 Views
    CerberusC

    An e-book from IDIS, “Utilizing Video Technology to Overcome Challenges in North American Brick-and-Mortar Retail,” identified uses for video surveillance and analytics in retail organizations.

    https://www.securitymagazine.com/articles/98170-retail-video-surveillance-can-reduce-violence-and-retail-shrink

  • SOVA, Android Banking Trojan, returns

    1
    0 Votes
    1 Posts
    18 Views
    CerberusC

    Researchers at Cleafy discovered a version of SOVA that appears to be targeting more than 200 mobile applications, including banking apps and crypto exchanges/wallets.

    https://www.securitymagazine.com/articles/98168-sova-android-banking-trojan-returns

  • 0 Votes
    1 Posts
    19 Views
    CerberusC

    Luke Hands has been named Director of Health, Safety, Environmental & Quality at construction firm Ardmore Group.

    https://www.securitymagazine.com/articles/98167-luke-hands-named-director-of-health-and-safety-at-ardmore-group

  • 0 Votes
    1 Posts
    22 Views
    CerberusC

    Is your organization a good candidate for Secure Access Service Edge (SASE)? Here are six indicators that suggest it could be.

    https://www.securitymagazine.com/articles/98165-for-stronger-cybersecurity-in-the-remote-work-era-just-say-sase

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    The BlackBerry Cyber Insurance Coverage study surveyed 450 information technology (IT) and cybersecurity decision-makers about their cyber insurance coverage and ransomware protection levels.

    https://www.securitymagazine.com/articles/98166-does-cyber-insurance-cover-ransomware-payment-demands

  • 0 Votes
    1 Posts
    14 Views
    CerberusC

    The FBI’s 2021 Active Shooter Incidents report reveals key trends involving active shooters in the U.S.

    https://www.securitymagazine.com/articles/98159-us-active-shooter-incidents-rose-52-in-2021

  • 0 Votes
    1 Posts
    10 Views
    CerberusC

    Access control, weapons detection and visitor management systems are just some of the security technologies helping to prevent healthcare workplace violence.

    https://www.securitymagazine.com/articles/98158-combat-workplace-violence-with-security-technology

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    A roundup of some of the new security solutions to be displayed and demonstrated at GSX.

    https://www.securitymagazine.com/articles/98164-spotlight-on-security-technology-at-gsx-2022

  • 0 Votes
    1 Posts
    22 Views
    CerberusC

    New and fast-evolving threats such as synthetic identity fraud and other types of cybercrime, have made the exercise of staying ahead of fraudsters challenging. Experian is here to provide solutions.

    https://www.securitymagazine.com/articles/98080-taking-a-personal-approach-to-identity-will-mitigate-fraud-risk-and-ensure-a-great-customer-experience

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    Default security configurations, weak passwords and human error are the top vectors for cyberattackers targeting enterprise networks. Penetration testers share how to avoid these cyber risks.

    https://www.securitymagazine.com/articles/98157-cybersecurity-lessons-from-the-red-team-how-to-prevent-a-data-breach

  • 0 Votes
    1 Posts
    20 Views
    CerberusC

    The Federal Trade Commission will be exploring rules to crack down on lax data security and harmful commercial surveillance.

    https://www.securitymagazine.com/articles/98156-data-security-surveillance-practices-to-be-examined-by-ftc

  • How to protect cybersecurity budgets

    1
    0 Votes
    1 Posts
    16 Views
    CerberusC

    For chief information security officers (CISOs) and their organizations, the question is not if the cybersecurity budget should be cut. It’s how much risk they are willing to take.

    https://www.securitymagazine.com/blogs/14-security-blog/post/98154-how-to-protect-cybersecurity-budgets

  • 0 Votes
    1 Posts
    14 Views
    CerberusC

    Chief information security officers (CISOs) must be early adopters and explore emerging cyber technology if they hope to keep ahead of cybercriminals.

    https://www.securitymagazine.com/articles/98152-why-it-pays-to-be-an-early-adopter-of-cybersecurity-technology