Quick Glossary: Cybersecurity Attack Response and Mitigation

Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you had better be prepared. This quick glossary from TechRepublic... Read more »

EU General Data Protection Regulation Policy

The EU General Data Protection Regulation is a comprehensive set of rules designed to keep the personal data of all EU citizens collected by any organization, enterprise or business... Read more »

Microsoft Azure AI Adds GPT-4 and New Virtual Machines

Microsoft is working on creating guidelines for red teams making sure generative AI is secure and responsible. Read more »

Australia’s Banking Industry Mulls Better Cross-Collaboration to Defeat Scam Epidemic

The ACCC has given the green light for cross-banking collaboration to address scams. Here’s how IT pros in Australia can and should address the current regulatory environment. Read more »

Encryption Policy

Encryption is vital for securing data, whether in transit or stored on devices. It can provide peace of mind that communications will not be intercepted and that sensitive information... Read more »

Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud

Qualys report looks at how misconfiguration issues on cloud service providers help attackers gain access. Read more »

ChatGPT Security Concerns: Credentials on the Dark Web and More

ChatGPT-related security risks also include writing malicious code and amplifying disinformation. Read about a new tool advertised on the Dark Web called WormGPT. Read more »

How an 8-character password could be cracked in just a few minutes

Advances in graphics processing technology and AI have slashed the time needed to crack a password using brute force techniques, says Hive Systems. Read more »

UK’s NCSC Publishes New Shadow IT Guidance

Discover the new shadow IT guidance published by the U.K.’s NCSC. Use this guide to better identify and reduce the levels of shadow IT within your organization. Read more »

8 Best Identity and Access Management (IAM) Solutions for 2023

Identity and access management software helps you maintain control of your environment by allowing authorized users to access company resources. Learn 10 of the top IAM tools to see... Read more »
Subscribe to our Newsletter