Guidelines for building security policies

PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in... Read more »

Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign. The post... Read more »

Report: Too many enterprises have shadow IT – unlocked doors with no cameras

New report says far too many firms have too many IT assets they cannot see or aren’t using, with some Windows servers lacking endpoint protection and patch management. The... Read more »

Ransomware gangs’ harassment of victims is increasing

The harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward employees, C-suite executives and even customers. The post Ransomware... Read more »

Learn cybersecurity skills by participating in real projects

These live sessions are on sale for a limited time. The post Learn cybersecurity skills by participating in real projects appeared first on TechRepublic. Read more »

Validated Storage for Commvault Backup & Recovery

The Commvault Backup & Recovery Software suite is comprised of several individual component services. The component responsible for moving and storing the backup data is called the MediaAgent. Seagate... Read more »

Security response policy

PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify... Read more »

BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent... Read more »

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. The post First Dero cryptojacking campaign targets unprotected... Read more »

Running WordPress on Azure for secure, fast and global content delivery

Learn about Microsoft’s WordPress on Azure App Service, as well as an interesting alternative from WP Engine. The post Running WordPress on Azure for secure, fast and global content... Read more »
Subscribe to our Newsletter