Security News

April 2021 Patch Tuesday forecast: Security best practices
2021-04-09 05:26

March kept us all very busy with the ongoing out-of-band Microsoft updates for Exchange Server and the printing BSODs, which plagued us since last Patch Tuesday. The Forum of Incident Response and Security Teams is an international organization that provides best practices and assistance when dealing with a security incident.

CSAE: Guiding principles and best practices for data scientific investigations of organized crime
2021-03-23 11:28

CSAE framework: Smart data science technologies supporting criminal investigations. A frequently proposed solution is the introduction of 'smart' data science technologies to support criminal investigations.

Remote hiring: Cybersecurity best practices
2021-03-15 19:54

In the TechRepublic article Amazon, Disney, and Uber reveal remote interviewing and hiring processes, N.F. Mendoza looks at key human resource trends and predictions regarding remote hiring. Aside from figuring how to handle all the subtleties of remote hiring, there are plenty of cybersecurity challenges that also need to be addressed.

Top videoconferencing attacks and security best practices
2021-01-12 04:00

It's important to understand these threats and how secure configuration of videoconferencing systems can improve the overall security of an organization and individual everyday users. Making sure your videoconferencing technology is set up securely can help prevent these attacks from being successful.

Telemed Poll Uncovers Biggest Risks and Best Practices
2020-12-21 12:00

Telemed is a two-way street; patients at home are using home networks and personal devices to access their care - which can be much more susceptible to attackers than doctors' office infrastructure. When it comes to the risks that cybersecurity professionals are concerned about, more than half of respondents said that the biggest security challenges stem from the risk of data breaches as more patient information moves to the cloud.

How to apply data protection best practices to the 2020 presidential election
2020-10-28 06:00

A recent attack on Tyler Technologies, a software provider for local governments across the US, highlighted the concerns held across the nation and left many to wonder if the software providers in charge of presidential election data might suffer a similar fate. The best defense also integrates cybersecurity and data protection, as removing segmentation streamlines the process of detecting and responding to attacks, while simultaneously recovering systems and data.

Three best practices for responsible open source usage in the COVID-19 era
2020-10-15 05:00

Since well before the pandemic, software developers have leveraged open source code as a means to speed development cycles. Applications today are usually designed using hundreds of unique open source components, which then reside in their software and workspaces for years.

Cybersecurity best practices: An open letter to end users
2020-10-01 21:16

In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users-in particular, what not to do to keep company networks, equipment, and data secure. Part of the reason for this is because you're always fighting an uphill battle named end users.

Vulnerability Disclosure: Ethical Hackers Seek Best Practices
2020-09-04 16:55

The process of vulnerability disclosure has improved over the years, but still too many security researchers face threats when trying to report bugs. Disclosure policies that give ethical hackers clear guidelines are vast and varied and are seldom universally followed, which adds to the friction between researchers and vendors.

The effectiveness of using DNS as a foundational element in future network security best practices
2020-07-17 04:00

As cyberattacks escalate, Infoblox and Forrester Consulting investigated how security and risk teams are using their DNS investments. 94% of S&R leaders either use or consider DNS as a starting point for threat investigations but only 43% of security and risk leaders rely on DNS as a data source to complete their investigations.