From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them. Read More ▶ | | | Trial Download: SelectHub This interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Get everything you need to make the right decision here! Read More ▶ | The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised. Read More ▶ | | PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so. Read More ▶ | | | Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better. Read More ▶ | | The three main email security protocols complement one another, so implementing them all provides the best protection. That's easier said than done, but these tips can help. Read More ▶ | | Contrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark. Read More ▶ | | White Paper: SlashNext NSS labs recently published an evaluation of seven breach detection systems from FireEye, Cisco Check Point, Fortinet, LastLine and TrendMicro. Not surprisingly, the report shows that five out of the seven products tested missed evasions. Read More ▶ | CSO Insider | Editor's Picks | | | |
0 comments:
Post a Comment