Author Details

Security as a Service Why Apply for SECaaS

In today’s corporate environment, businesses and organizations rely heavily on services. This is especially true for their IT department,...

Read More
What Does GDPR Mean for Your Organization

GDPR ,or the General Data Prevention Regulation, is a new law that has been enforced by the European Union...

Read More
The Five Incident Response Steps

It is important to remember that implementing incident response steps is a process and not an isolated event. For...

Read More
Defining and Understanding User and Entity Behavior Analytics (UEBA)

User and Entity Behavior Analytics, or UEBA for short, provides you with a comprehensive solution for IT security while...

Read More

The Principle of Least Privilege, or POLP, is the idea that any user, program, or even process should only...

Read More
Why Is a Data Classification Policy Absolutely Important

Today, data is a valuable commodity. Without it, company executives cannot make well-informed decisions, marketers won’t understand their market’s...

Read More
Building Your Incident Response Team

In order for an organization to properly respond to a breach or incident, they need to have a proper...

Read More
Hostinger Resets User Passwords after data breach

Hostinger web hosting provider resets all customer passwords during the weekend, after learning that an attacker has unauthorized access...

Read More
Healthcare Information Security How to Protect Patient Data

In today’s information-centric environment, healthcare providers are one of the biggest targets for sensitive personal information. Ransomware and data...

Read More
Adwind Spyware-as - a-Service Utility Grid Operators Attacks

A phishing campaign for grid operators uses a PDF attachment to offer spyware. A campaign aimed at a domestic...

Read More

Page 1 of 96

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register