Achieving Pervasive Security Above, Within and Below the OS

Keeping business data secure is a challenging task, complicated by the proliferation of endpoints operating outside of the organizational network and the constant evolution of threat vectors. Dell and... Read more »

Meet the Future of Work With Confidence

In this article, Dell Technologies – along with the partners at Intel and Microsoft – provide a blueprint for hybrid working success. You’ll look at the future-ready technologies and... Read more »

Acronis Cyber Protect Home Office: The full image backup tool to meet today’s demanding needs

Jack Wallen tests the Acronis Cyber Protect Home Office app, a disaster recovery tool anyone can use to create a full disk clone of crucial systems with ease. The... Read more »

FBI warns of phony cryptocurrency apps aiming to steal money from investors

Cybercriminals are creating fake cryptocurrency investment apps designed to defraud US investors and exploit investment firms, cautions the FBI. The post FBI warns of phony cryptocurrency apps aiming to... Read more »

Tech companies pledge free cybersecurity training at White House summit Tuesday

The goal is to help alleviate the estimated 700,000 vacancies in cybersecurity jobs in the U.S. The post Tech companies pledge free cybersecurity training at White House summit Tuesday... Read more »

Cyber Safety Review Board classifies Log4j as ‘endemic vulnerability’

CSRB has released a report saying that the Log4j exploit is here to stay long-term, meaning businesses should be ready in case of a cyber attack. The post Cyber... Read more »

5 tips for securing SSH on your Linux servers

Jack Wallen offers 5 tips for securing Linux that you can take care of in 5 minutes or less. The post 5 tips for securing SSH on your Linux... Read more »

LinkedIn and Microsoft are the most impersonated brands in phishing attacks

LinkedIn was exploited in almost half of the phishing attempts seen by Check Point Research during the second quarter of 2022. The post LinkedIn and Microsoft are the most... Read more »

Leveraging the power of cyber fusion centers for organizational security

Cyber fusion centers provide advanced security capabilities. Learn how your organization can strengthen its cyberdefense mechanism through a cyber fusion center. The post Leveraging the power of cyber fusion... Read more »

Trellix finds business services top target of ransomware attacks

Ransomware groups are now starting to pick sides in the Russian-Ukrain conflict. Learn more about who and what are at risk. The post Trellix finds business services top target... Read more »
Subscribe to our Newsletter