Personal data encryption in Windows 11

There’s a new, more secure way to encrypt files in Windows 11, but it’s only an option for building secure applications, not a replacement for BitLocker. The post Personal... Read more »

C-suite execs expect cyberattacks targeting financial data to increase this year

The trend will carry from the past 12 months when more than a third of executives polled by Deloitte said that cyberattacks targeted their financial and accounting data. The... Read more »

If your business needs cybersecurity, you should become the expert

One of the web’s biggest cybersecurity training resources, The Complete 2023 Cyber Security Developer & IT Skills Bundle, is now just $79. The post If your business needs cybersecurity,... Read more »

New cybersecurity data reveals persistent social engineering vulnerabilities

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022. The post New... Read more »

Metaverse adds new dimensions to Web 3.0 cybersecurity

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game will continue, but with more dimensions. The post Metaverse... Read more »

Massive ransomware operation targets VMware ESXi: How to protect from this security threat

These ransomware infections on VMware ESXi software are due to a vulnerability that has existed since 2021. Find out the most targeted countries and how to secure your organization.... Read more »

TrickGate crypter discovered after 6 years of infections

New research from Check Point Research exposes a crypter that stayed undetected for six years and is responsible for several major malware infections around the globe. The post TrickGate... Read more »

The importance of data retention policies

A data retention policy is the first step in helping protect an organization’s data and avoid financial, civil, and criminal penalties that increasingly accompany poor data management practices. This... Read more »

Auditing and logging policy

Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that... Read more »

Access management policy

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the... Read more »
Subscribe to our Newsletter