Security News

5 best practices for IIoT project success
2020-02-21 20:24

Based on the results of these testbed proofs-of-concept, today the IIC released a white paper, A Compilation of Testbed Results: Toward Best Practices for Developing and Deploying IIoT Solutions, detailing the best practices companies should adopt to ensure successful IIoT deployments. What isn't different are the best practices organizations can adopt to ensure that the early stages of IIoT development and deployment go as smoothly and successfully as possible.

ProcessUnity Vendor Risk Management expanded to include new best practices configuration
2020-02-20 16:06

ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today announced a new pre-built configuration of its award-winning Vendor Risk Management solution. Best Practices Configuration for ProcessUnity Vendor Risk Management is a pre-configured Third-Party Risk Management program with turn-key workflows, assessments, calculations, risk analysis and reporting, allowing small to midsize organizations to successfully launch and maintain a third-party risk program from day one.

Phishing Attacks: Best Practices for Not Taking the Bait
2020-02-12 11:35

Deceptive Phishing - The most common type of phishing attacks, whereby threat actors impersonate a legitimate company to steal users' personal data and access credentials. Spear Phishing - These types of attacks are more sophisticated, whereby the threat actor customizes the attack email with the target's name, job title, company, and other personal information to make the recipient believe they have a connection to the sender.

Kubernetes rollouts: 5 security best practices
2020-02-10 21:45

If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk. Portshift recently released a best practices list for tackling the security issues surrounding the K8s platform.

Modern security product certification best practices
2020-01-06 06:00

IT security product manufacturers are required to achieve government mandated, standards-based certifications to get their product in market. When it comes to cybersecurity product development, the industry is agile by design, but security product certification methods haven't kept pace with modern development methods and release cycles.

Week in review: AD password reset best practices, new issue of (IN)SECURE
2019-12-15 11:00

Here’s an overview of some of last week’s most interesting news and articles: DNS over HTTPS’ threat to enterprise security DNS over HTTPS (DoH) is here, regardless who likes it or not....

Active Directory password reset best practices
2019-12-12 06:30

Password change and password reset are terms that are often used interchangeably. However, they are not the same. A user will perform a password change when they remember their existing password,...

Implementing Cyber Best Practices Requires a Security-First Approach
2019-12-05 14:47

Competing in today's digital marketplace requires that organizations be cyber-savvy. End users and customers need organizations to understand things like web application development, digital...

Security pros explain Black Friday best practices for consumers and businesses
2019-11-22 16:19

Consumers have to make sure not to fall prey to fraudulent coupons or deceptively spoofed retailer websites.

Do third-party users follow security best practices and policies?
2019-11-21 06:30

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security risks, One Identity...