National Counterintelligence and Security Center: 5 priorities for 2020

Introduction: NCSC’s role For years, the United States has faced increasingly aggressive and complex threats from foreign intelligence entities (FIEs) and nation-states, as well as from a range of…
Go on to the site to read the full article
The post … Continue reading National Counterintelligence and Security Center: 5 priorities for 2020

RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to…
Go on to the site to read the full article
The… Continue reading RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

The False Claims Act and cybersecurity: Are third-party vendors putting you at risk?

Introduction A government supplier law written over a century ago may seem outdated in the digital age, but it may be putting your company at risk. Recent court rulings related to the 1863 False…
Go on to the site to read the full article
The post Th… Continue reading The False Claims Act and cybersecurity: Are third-party vendors putting you at risk?

Coronavirus predictions: What are the long-term workplace implications of COVID-19?

Introduction: What will the world look like after the COVID-19 vaccine? Human societies are often challenged by events out of our control. Extreme weather events happen and take with them many…
Go on to the site to read the full article
The post Coro… Continue reading Coronavirus predictions: What are the long-term workplace implications of COVID-19?

New Cisco report: SMB security posture catches up to enterprise counterparts

Introduction Small-to-medium businesses (SMBs) have a lot of things to deal with. They have a huge number of responsibilities but not a lot of resources to do them with and even fewer people to…
Go on to the site to read the full article
The post New… Continue reading New Cisco report: SMB security posture catches up to enterprise counterparts

14 best open-source web application vulnerability scanners [updated for 2020]

Learn Vulnerability Scanning Learn about vulnerability scanning tools. This skills course covers ⇒ Application and container scans ⇒ Analyzing vulnerability scans ⇒ Vulnerability scanning LEARN MORE…
Go on to the site to read t… Continue reading 14 best open-source web application vulnerability scanners [updated for 2020]

Key findings from Infosec’s 2020 IT & security talent pipeline study

Fewer challenges facing our industry are more pervasive than the cybersecurity talent shortage. It’s an advanced persistent threat of the human variety that impacts nearly every component of an…
Go on to the site to read the full article
The po… Continue reading Key findings from Infosec’s 2020 IT & security talent pipeline study