Security News

Whitepaper: Why Microsoft’s password protection is not enough
2024-02-07 03:45

Microsoft's Azure AD Password Protection, now rebranded as Microsoft Entra ID helps users create a password policy they hope will protect their systems from account takeover and other identity and access management issues. The absence of Dark Web data usage in Microsoft Entra ID's security measures poses a considerable risk to businesses by not adequately protecting against compromised credentials.

Whitepaper: MFA misconceptions
2024-01-24 03:45

Please turn on your JavaScript for this page to function normally. While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses.

Week in review: 9 free cybersecurity whitepapers, Patch Tuesday forecast
2023-06-11 08:00

20 cybersecurity projects on GitHub you should check outOpen-source GitHub cybersecurity projects, developed and maintained by dedicated contributors, provide valuable tools, frameworks, and resources to enhance security practices. How to make developers love securityStories of the tension between developers and security teams are a longstanding feature of the software industry, stemming from the friction that security is often perceived to create.

9 free cybersecurity whitepapers you should read
2023-06-05 04:30

This list of free cybersecurity whitepapers that don't require registration covers a wide range of common cyber risks. To establish a robust and successful security program for industrial control systems or operational technology, a combination of five cybersecurity controls can be employed.

Whitepaper: Shared responsibility model for cloud security
2022-11-02 04:00

With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources to help protect their data and workloads in the cloud. Download this white paper to learn what CIS resources can help secure your cloud environments.

Whitepaper: 5 steps to improved MFA adoption
2022-02-15 04:15

5 steps to improved MFA adoption is an unbiased, comprehensive analysis of the present and future of multi-factor authentication, and challenges to widespread adoption. ID, the mobile authentication platform, the guide is written and produced by independent cybersecurity experts The Cyber Hut.

Whitepaper: Dell Technologies How Intrinsic Security Protects Against Business Disruption
2022-02-14 00:00

When it comes to IT, disruption is just another day at the office. From fending off cyberattacks to incorporating leading-edge technologies, today's organizations no longer experience "Business as usual."

Whitepaper: Dell Technologies Securing Endpoints Amit New Threats
2022-02-14 00:00

Giving employees the flexibility to be fully productive while working remotely makes it critical that businesses have endpoint security measures in place to prevent, detect and respond to the growing threat landscape while allowing employees the flexibility to work remotely. Dell endpoint protection spans the enterprise to include multi-cloud data protection solutions that can be delivered as software-defined and/or appliance-based solutions, and above all, enables users to remain highly productive by defeating increasingly sophisticated attacks in the new remote work paradigm.

Whitepaper: What is CCPA and how can it affect your business?
2021-10-14 08:00

Learn about California's Consumer Privacy Laws and Regulations, what is their impact on your security and how to comply with their essential requirements. Due to the rapid pace of digital application developments, the latest legal precedents further complicate managing a digital assets inventory while fully complying with CCPA and CPRA regulations.

[Whitepaper] XDR vs. NDR/NTA – What do Organizations Truly Need to Stay Safe?
2021-07-07 05:53

Most teams will have to choose between deploying either a network traffic analysis or network detection and response tool or an endpoint detection and response tool to supplement their existing stacks. On the other hand, some organizations are getting the best of both options by switching to extended detection and response tools which often provide all these tools in one solution.