Security News

SSL Certificate Best Practices Policy
2024-11-13 16:00

SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications that communicate with remote systems. Certificates...

Cyber Insurance Policy
2024-11-07 16:00

As the digital landscape becomes more interconnected, it brings with it the growing threat of cyberattacks. The purpose of this policy, written by Maria Carrisa Sanchez for TechRepublic Premium,...

Why your password policy should include a custom dictionary wordlist
2024-10-03 14:02

Utilizing a custom dictionaries helps strengthen your password policies. Learn more from Specops Software about how to build custom dictionaries in your Windows Active Directory password policy. [...]

Why your password policy should include a custom dictionary
2024-10-03 14:02

Utilizing a custom dictionaries helps strengthen your password policies. Learn more from Specops Software about how to build custom dictionaries in your Windows Active Directory password policy. [...]

Cloud Security Policy
2024-09-26 16:00

The purpose of this Cloud Security Policy, written by Ray Fernandez for TechRepublic Premium, is to provide guidelines for secure and effective cloud computing operations that ensure the integrity...

UPS supplier's password policy flip-flops from unlimited, to 32, then 64 characters
2024-09-23 12:01

That 'third party' person sure is responsible for a lot of IT blunders, eh? A major IT hardware manufacturer is correcting a recent security update after customers complained of a password...

Cloud Access Security Broker Policy
2024-09-15 16:00

The rise in cloud adoption has made it imperative for more businesses to rely on cloud providers to store, access, and manage their data and applications. While running applications and services...

Supply Chain Security Policy
2024-08-18 16:00

With the increasing reliance on complex and global supply chains, more companies are exposed to a wide range of risks, including theft, counterfeiting, cyberattacks, natural disasters, geopolitical conflicts, and regulatory changes. This customizable policy, written by Franklin Okeke for TechRepublic Premium, outlines the necessary measures and standards that will enhance the resilience of a supply chain.

Multi-Factor Authentication Policy
2024-08-11 16:00

This reality requires the adoption of a multi-factor authentication policy within organizations. Multi-factor authentication is a powerful tool for safeguarding sensitive data from unauthorized access.

Internet Resource Access Policy
2024-08-05 16:00

These internet resources can be web servers, email servers, proxy servers, routers, FTP servers or any other public-facing device which performs a service or function. Because these resources are both generally critical for company operations and especially vulnerable to risks, threats or attacks due to their public-facing nature, setting strict guidelines for how these devices should be configured for access is a key priority to ensure business continuity and data protection.