Windows 10 users get protection against PUAs

Windows 10 users who upgrade to v2004 will finally be able to switch on a longstanding Windows Defender feature that protects users against potentially unwanted applications (PUAs). What are PUAs? Also called PUPs (potentially unwanted programs), PUAs … Continue reading Windows 10 users get protection against PUAs

Are Current Security Assurance Models Suitable for the Digital World?

A proactive security assurance model is a key enabler for delivering an effective operating model that encompasses the protection of people, processes and technology.

The post Are Current Security Assurance Models Suitable for the Digital World? appeared first on Security Intelligence.

Continue reading Are Current Security Assurance Models Suitable for the Digital World?

Most attacks successfully infiltrate production environments without detection

While organizations continue to invest significant budget dollars in security controls and assume that this means assets are fully protected, the reality is that a majority of attacks successfully infiltrate production environments without their knowle… Continue reading Most attacks successfully infiltrate production environments without detection

Cybersecurity in Education (K-12) with the CIS Controls

Why is cybersecurity important to Education? Acknowledging recent reports of ransomware targeting educational institutions, it is no wonder that there have also been articles that attempt to lure in readers with “free” tools. What is disapp… Continue reading Cybersecurity in Education (K-12) with the CIS Controls

Cloud Security Threats: Escaping the Egregious Eleven – Part Two

Depending on your familiarity with the Cloud Security Alliance (CSA) publications, part one of this blog was intended as either an introduction or a nagging reminder of the ‘Egregious Eleven’ security threats to cloud computing. It also hop… Continue reading Cloud Security Threats: Escaping the Egregious Eleven – Part Two

Why It’s Time to Adopt IoT Security by Design

We encounter the IoT in myriad forms as we go about our daily routine, from sensors to smart vehicles, which is why businesses and manufacturers need to work together to adopt IoT security by design.

The post Why It’s Time to Adopt IoT Security by Design appeared first on Security Intelligence.

Continue reading Why It’s Time to Adopt IoT Security by Design

Security and risk compliance: Still the most important part of IT strategy

Security practice is the number one priority for IT teams, with a clear majority (59%) reporting deficiencies in the controls, that should ensure data processing and storage systems adhere to security policies; while over a quarter (27%) pointing to a … Continue reading Security and risk compliance: Still the most important part of IT strategy

macOS Catalina: Security and privacy improvements

Apple has released macOS Catalina (v10.15), a new major release of its desktop operating system, which comes with many functional and security and privacy improvements. The former include a new game subscription service, a feature that extends Mac desk… Continue reading macOS Catalina: Security and privacy improvements

Security Awareness: Adding a Business Context

Putting security in a business context can help employees be more cautious with their organization’s resources In my first blog I would like to give my perspective on how to spread security awareness among employees. No matter how geeky an audie… Continue reading Security Awareness: Adding a Business Context

Enterprises catching up with the explosion of cloud use and shadow IT in the workplace

Businesses worldwide are gaining control of previously unmonitored and unsupported cloud applications and devices, known as shadow IT, that lurk in their IT environments, according to the 2019 Duo Trusted Access Report. The average number of organizati… Continue reading Enterprises catching up with the explosion of cloud use and shadow IT in the workplace