Both bitcoin and blockchain are vulnerable to attack. Here's what you need to know to protect yourself and why blockchain is becoming a foundational technology. Read More ▶ | | | Video/Webcast: Citrix Systems Inc Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the security aspects? There may be some instances where users, shouldn't have access to sensitive applications and data. That's where Citrix provides the power of contextual access which allows IT to set policies for who can access data based on location, device and network. Watch this video and we'll show you how. Read More ▶ | As you've likely heard by now, there are some problems with Intel, AMD, and ARM processors. Called Meltdown and Spectre, the discovered attack possibilities are rather severe, as they impact pretty much every technical device on the network or in your house (PCs, laptops, tablets, phones, etc.). Here's a breakdown of all the things you need to know. Read More ▶ | | More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read More ▶ | | | Stressed and stretched, IT security teams look to automation for relief. Read More ▶ | | Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions. Read More ▶ | | Researchers deanonymized anonymous Tor Mail accounts, raising awareness of the implications of reusing even complex passwords when creating an anonymous account. Read More ▶ | | There are plenty of antivirus tools for Android. Here's how the top 10 measure up in protection, usability and features. Read More ▶ | | White Paper: sqrrl Check out the popular "Huntpedia" eBook featuring all your favorite Threat Hunting people. Sqrrl has partnered with over a dozen of the leading experts on Threat Hunting and Incident Response to share their own tactics, techniques and procedures for finding evil on the wire. Read More ▶ | CSO Insider | Editor's Picks | | | |
0 comments:
Post a Comment