The CIS Benchmarks Community consensus process
The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security...
Read more →The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security...
Read more →Infostealer malware, which consist of code that infects devices without the user’s knowledge and steals data, remains widely available to...
Read more →You’ve just been named as your organization’s new head of security. So what do you do first? Read part one...
Read more →KRY is undoubtedly one of Sweden’s most successful and talked-about startups. The company offers video consultations with licensed doctors through...
Read more →Applications have become the lifeblood of businesses in today’s connected world. Software is now the “front door” into your business...
Read more →A financially motivated cybergang tracked by Mandiant as ‘UNC3944’ is using phishing and SIM swapping attacks to hijack Microsoft Azure...
Read more →Most VPN users can be put in one of three categories. It all depends on your needs and your threat...
Read more →Web security in 2016 is very different from what it was like in 2006, 1996 or even further back. As...
Read more →Cybersecurity researchers and IT admins have raised concerns over Google’s new ZIP and MOV Internet domains, warning that threat actors...
Read more →Lacroix develops and manufactures electronic equipment for the automotive, home automation, aerospace, industrial, and healthcare industries. Lacroix also creates and...
Read more →The magnitude of the data breach is significant, as it has potentially compromised the personal information of 286,699 individuals. Credit...
Read more →The below is a modified version of a blog originally posted by Martin Heiland, Security Officer at web-based communication, collaboration...
Read more →