Proposed Active Cyber-Defense Bill Channels Mao Zedong

When an intruder is discovered in your network, every incident response team’s response is similar: What are they doing? What have they done? How long have they been here? Whose data has been compromised? How do we expunge them from our network? And the million-dollar question: Who are these miscreants in our network? All deserving..

The post Proposed Active Cyber-Defense Bill Channels Mao Zedong appeared first on Security Boulevard.

Continue reading Proposed Active Cyber-Defense Bill Channels Mao Zedong

7 Strategies to Secure Enterprise IoT

The internet of things (IoT) is opening a whole new world of possibilities. Unfortunately, it also is creating a whole new world of threats too, such as ransomware of things (RoT). Here are seven things enterprises can do to better secure their IoT. Kn… Continue reading 7 Strategies to Secure Enterprise IoT

Make Security a Business Partner to Avoid Job Burnout

Take a high-pressure job, add in high-performance expectations, season with continual threats from hackers looking to steal your company’s electronic assets, and you have a sure-fire recipe for burnout. The list of things that keep chief information security officers awake at night—and some of them still in the office with their sleeves rolled up—are legion…

The post Make Security a Business Partner to Avoid Job Burnout appeared first on Security Boulevard.

Continue reading Make Security a Business Partner to Avoid Job Burnout

Cybersecurity and Machine Learning/AI: What’s the Real Impact?

Will AI render human analysts obsolete, or be an extension that helps them be more effective? How about bad guys? Are we headed for an AI showdown? Here’s the lay of the land in AI territory now. The buzz on artificial intelligence (AI) is deafening. Depending on who is hawking what, AI is either vastly..

The post Cybersecurity and Machine Learning/AI: What’s the Real Impact? appeared first on Security Boulevard.

Continue reading Cybersecurity and Machine Learning/AI: What’s the Real Impact?

Supply Chain Attack Hits Maker of Popular MacOS Apps

Eltima Software, a maker of popular applications for macOS, had its website compromised by hackers who replaced the installers for two of its applications with trojanized versions. This is the latest in a string of software supply chain attacks that ha… Continue reading Supply Chain Attack Hits Maker of Popular MacOS Apps

DOJ, AG Tout ‘Responsible Encryption’ to Bolster Prosecutions

In the past week, U.S. Deputy Attorney General Rod J. Rosenstein delivered two talks that implored the technology industry to embrace what he deems “responsible encryption.” When he spoke at the United States Naval Academy, he cloaked his commentary in hyperbole and innuendo, as if he was trying to draw battle lines between industry and..

The post DOJ, AG Tout ‘Responsible Encryption’ to Bolster Prosecutions appeared first on Security Boulevard.

Continue reading DOJ, AG Tout ‘Responsible Encryption’ to Bolster Prosecutions

Experts Stress Better Election Security Following DefCon Report

There has been a lot of rumor and speculation about the 2016 U.S. presidential election and the possibility that the results were manipulated or hacked in some way. While investigations continue and there is no hard evidence I am aware of that any succ… Continue reading Experts Stress Better Election Security Following DefCon Report

How to Benefit from Veeam ONE: Monitoring, Performance Optimization, Reporting, and More

Complete visibility within the data center is essential to keeping businesses available 24.7.365. Visibility into the data center allows IT administrators to properly utilize resources, to be proactive in troubleshooting issues, and to run reports on t… Continue reading How to Benefit from Veeam ONE: Monitoring, Performance Optimization, Reporting, and More

Microsoft Public Folders & Other Notes from the Field

The complexity in migrating Public Folders is quickly becoming a migration consideration that needs a strategy of its own. Whether you are going to Microsoft Exchange or Office 365, there’s much to think about to effectively migrate your data. Read about our experience with Public Folders and other notes from the Field.

read more

Continue reading Microsoft Public Folders & Other Notes from the Field