Keep Your Data Safe as You Become More Productive for Just $30 Through 3/24

Upgrading to Microsoft Windows 10 Pro can make your work easier and your computer more secure. Get it now for just $29.97 through 3/24. Continue reading Keep Your Data Safe as You Become More Productive for Just $30 Through 3/24

Adopting Microsegmentation Into Your Zero Trust Model, Part 1

The idea to discuss microsegmentation and zero trust came to me while reading cybersecurity articles over cellular data as I was waiting in line one day. And, I wrote this article on different devices: on my laptop connected to my home wireless network; on my tablet over Wi-Fi. Each time I switched devices or wireless […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 1 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 1

Video Conferencing Security Tips You May Have Overlooked

Video conferencing applications grew substantially following the outbreak of the coronavirus (COVID-19) global pandemic. According to Research and Markets article “Video Conferencing Demand Rises due to Social-Distancing,” video conferencing software experienced 62 million downloads in March 2020. This increase in use resulted from businesses adopting video conferencing platforms as a means to facilitate their transition […]

The post Video Conferencing Security Tips You May Have Overlooked appeared first on Security Intelligence.

Continue reading Video Conferencing Security Tips You May Have Overlooked

Cybersecurity in the Summer of Uncertainty

What is the new normal for security professionals in the Summer of 2020? Hint: It involves protecting a larger attack surface than anyone…
The post Cybersecurity in the Summer of Uncertainty appeared first on Security Boulevard.
Continue reading Cybersecurity in the Summer of Uncertainty

84% of Businesses Are Likely to Expand WFH Ability Despite Security Risks. Is Remote Work Becoming the New Normal?

Despite the downsides of replacing on-premise work with remote work, 84% of companies anticipate a consistent expansion of remote work practices, according to a 2020 Remote Work-From-Home Cybersecurity Report published earlier this week.
The post … Continue reading 84% of Businesses Are Likely to Expand WFH Ability Despite Security Risks. Is Remote Work Becoming the New Normal?

RSA 2020 Conference Recap: 7 Conference Observations from the Floor

RSA 2020 wrapped up last week in San Francisco, and once again, the show floor was buzzing with innovation and swag. While it’s…
The post RSA 2020 Conference Recap: 7 Conference Observations from the Floor appeared first on Security Boulevard.
Continue reading RSA 2020 Conference Recap: 7 Conference Observations from the Floor

Four Keys to Comprehensive Network Protection

According to IDC, worldwide security spending is expected to hit $133.8 billion by 2022, a CAGR of 9.2% over four years. Despite the…
The post Four Keys to Comprehensive Network Protection appeared first on Security Boulevard.
Continue reading Four Keys to Comprehensive Network Protection

Debunking The BlueKeep Exploit Hype – What You Should Know

WannaCry is still fresh in our memory, reminding organizations of how distractive an unpatched vulnerability can be especially if weaponized as a wormable threat that delivers ransomware. BlueKeep has been estimated to have the same disruptive pot… Continue reading Debunking The BlueKeep Exploit Hype – What You Should Know

10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack

With ransomware attacks attempted every 14 seconds, security teams understand that readiness and response capabilities are critical. Prepare your organization against these 10 common security gaps.

The post 10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack appeared first on Security Intelligence.

Continue reading 10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack

SOCKS Proxy Primer: What Is SOCKs5 and Why Should You Use It?

Organizations everywhere are using the SOCKs5 proxy to facilitate access to back-end services behind firewalls, eliminate third-party and free proxy servers, minimize errors and maximize performance.

The post SOCKS Proxy Primer: What Is SOCKs5 and Why Should You Use It? appeared first on Security Intelligence.

Continue reading SOCKS Proxy Primer: What Is SOCKs5 and Why Should You Use It?