Security News

How To Implement Zero Trust: Best Practices and Guidelines
2023-09-28 16:23

Implement a Zero Trust security model with confidence with these best practices and tool suggestions to secure your organization. The core components of zero trust include least privileged access policies, network segmentation and access management.

Why are computer security guidelines so confusing?
2023-07-27 04:00

If you find the computer security guidelines you get at work confusing and not very useful, you’re not alone. A new study highlights a key problem with how these guidelines are created, and...

Guidelines for building security policies
2023-03-23 12:00

TechRepublic Premium Hiring kit: Back-end developer PURPOSE Finding a back-end developer with programming and technical expertise as well as superior collaboration and communication skills will require a comprehensive recruitment strategy. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.

CIS Benchmarks: Community driven security guidelines
2022-10-19 09:18

CIS Benchmarks are the only consensus-developed security configuration recommendations both created and trusted by a global community of IT security professionals from academia, government, and industry. There are over 12,000 professionals in the CIS Benchmarks communities.

Aligning Your Password Policy enforcement with NIST Guidelines
2022-05-31 14:06

Even if an organization has already brought its password policy in line with NIST's recommendations, it is a good idea to periodically revisit those recommendations since they do change over time. Not surprisingly, NIST no longer recommends scheduled password changes.

US mergers doubled in 2021 so FTC and DoJ seek new guidelines to stop illegal ones
2022-01-19 12:31

The US Federal Trade Commission and Department of Justice Antitrust Division are launching a joint public inquiry as a first step to modernising merger guidelines and preventing anticompetitive deals. FTC chair Lina Khan said it was time for a merger review because the number of global deals reached in 2021 was the highest ever recorded - at a whopping $5.8 trillion - with the DoJ receiving twice the number of merger filings as in 2020.

US govt provides new guidelines for authentication systems
2022-01-04 20:59

While this new report outlines authentication requirements for government agencies, they are also excellent guidelines for all fields and user levels. On the strength of passwords, NIST underlines that the requirements of using special characters, for example !$#%&, are obsolete since users still tend to add something that will keep the password memorable.

Burned out workers are less likely to follow security guidelines
2021-12-09 06:30

"It's particularly surprising to find that burned-out security leaders, charged with protecting businesses, are doing a far worse job of following security guidelines - and putting companies at risk. It's now a business imperative for companies to engage the humans at the heart of security operations with tools, training and ongoing support to create a culture of security and care that helps us all stay safe at work." Burned out workers ignore the rules: They're a third less likely to follow their company's security guidelines.

eBook: Using NIST guidelines for secure passwords
2021-11-23 03:45

Designing and implementing a password policy that responds directly to NIST guidelines is a crucial step in locking down your company's security. Enzoic for Active Directory achieves password security in line with NIST by enabling real-time password policy enforcement and daily password auditing with automated remediation.

eBook: Using NIST guidelines for secure passwords
2021-11-10 13:34

Designing and implementing a password policy that responds directly to NIST guidelines is a crucial step in locking down your company's security. Enzoic for Active Directory achieves password security in line with NIST by enabling real-time password policy enforcement and daily password auditing with automated remediation.