Don’t FAIL your DLP Program
So you want to implement a Data Loss Prevention Program to secure your data. You go ahead and purchase one of the top rated(?)...
The Basics of IT Security Audit
An IT security audit is an evaluation of the security of a company's information systems by measuring how well they conform to a set...
US Secret Service: Rise in hacks of managed service providers (MSPs)
TheCISO -
The US Secret Service sent out a security alert last month to the US private sector and government organizations warning about an increase in...
Types of Man-In-The-Middle Attacks
What is a MITM Attack
Man In The Middle (MITM) are common attacks that allow attackers to "listen" to communication between two parties. When two...
Famous mobile apps are spying on you!
TheCISO -
During the last few weeks there have been several occasions where famous and widely used mobile applications have been caught on spying on your...
Fileless Malware Are NOT New But Are Still Dangerous
WHAT IS IT
Fileless malware is an advanced threat that can use legitimate software to compromise systems to steal information, leaving no trace to perform...
Free and Essential Security Tools You Should Already Be Using
Whether you are on the offensive or the defensive side of cybersecurity, there are open-source tools that are free to use and are essential...
How to be Anonymous Online
WHAT IS ANONYMITY
There are several levels of anonymity but the important idea behind anonymity is for a person to be non-identifiable, unreachable, or untrackable.
When...
How to Detect and Prevent Crypto Mining in your Environment
The explosion of crypto prices for many cryptocurrencies has brought more attention to them and more people want to earn cryptocurrencies by "mining" them...
How to Become a Cybersecurity Expert
Cybersecurity has become increasingly popular in the last decade. It has seen great interest from technical and non-technical people wanting to take their opportunity...
Microsoft Confirms Serious Vulnerability
TheCISO -
Now Microsoft has confirmed the risk that “an attacker with physical access to a system can use Thunderspy to read and copy data even from systems...
Cloud Threat Report 2020
TheCISO -
Oracle and KPMG published the "Cloud Threat and Security Report 2020" which identifies the key risks and challenges that organizations are facing as they...