What is privacy and why does it matter?

Privacy is a basic right and a necessary protection in the digital age to avoid victimization and manipulation. In much of the world, privacy is considered a basic human right. For example, citizens in the European Union have the right to dignity. They… Continue reading What is privacy and why does it matter?

It’s time to tap the next generation of cyber defenders

As college graduates of the Class of 2020 enter the workforce, we welcome a new generation of cyber professionals. Already this year’s crop of talent has demonstrated their work ethic in a virtual environment under unprecedented circumstances while exe… Continue reading It’s time to tap the next generation of cyber defenders

Ransomware recovery: Moving forward without backing up

Phishing scams tied to COVID-19 show no signs of stopping. More than 3,142 phishing and counterfeit pages went live every day in January, and by March, the number had grown to 8,342. In mid-April, Google reported they saw more than 18 million pandemic-… Continue reading Ransomware recovery: Moving forward without backing up

How do I select a DMARC solution for my business?

Domain-based Message Authentication, Reporting & Conformance (DMARC), is an email authentication, policy, and reporting protocol. It builds on the SPF and DKIM protocols to improve and monitor protection of the domain from fraudulent email. To sel… Continue reading How do I select a DMARC solution for my business?

Infosec is a mindset as well as a job, but burnout can happen to anyone

Time and again (and again), survey results tell us that many cybersecurity professionals are close to burnout and are considering quitting their jobs or even leaving the cybersecurity industry entirely. The reasons for this dire situation vary dependin… Continue reading Infosec is a mindset as well as a job, but burnout can happen to anyone

A look at modern adversary behavior and the usage of open source tools in the enterprise

Leszek Miś is the founder of Defensive Security, a principal trainer and security researcher with over 15 years of experience. Next week, he’s running an amazing online training course – In & Out – Network Exfiltration and Post-Exploit… Continue reading A look at modern adversary behavior and the usage of open source tools in the enterprise

July 2020 Patch Tuesday: Microsoft plugs wormable Windows DNS Server RCE flaw

On this July 2020 Patch Tuesday, Microsoft has plugged 18 critical and 105 high-severity flaws, Adobe has delivered security updates for ColdFusion, Adobe Genuine Service, Adobe Download Manager, Adobe Media Encoder and Adobe Creative Cloud Desktop App… Continue reading July 2020 Patch Tuesday: Microsoft plugs wormable Windows DNS Server RCE flaw

How do I select a network detection and response solution for my business?

Network detection and response (NDR) solutions enable organizations to improve their threat response, they help protect against a variety of threats, and also provide visibility into what is actually on the network. To select an appropriate network det… Continue reading How do I select a network detection and response solution for my business?

Ransomware, then and now: The change in data theft behavior

The rising number of people working from home have left more businesses at risk from ransomware than ever before. Gaps in network security, shadow IT and a greater reliance on remote communications present cyber criminals with a wealth of options for e… Continue reading Ransomware, then and now: The change in data theft behavior

The crypto-agility mandate, and how to get there

To achieve long-term data protection in today’s fast-changing and uncertain world, companies need the ability to respond quickly to unforeseen events. Threats like quantum computing are getting more real while cryptographic algorithms are subject to de… Continue reading The crypto-agility mandate, and how to get there