From Volume 269 Issue 2
What Cybersecurity Teams Can Learn From COVID-19
Nabil Hannan examines key similarities between medical and computer viruses that cybersecurity teams can use to keep businesses protected effectively
[SearchSecurity, August 12th, 2020]
4 Best Practices For Managing And Tracking SSL And TLS Certificates
Do you know what SSL protocols you expose to your users? Are your settings optimized for security? Have you properly deprecated older TLS certs? Here’s what you need to know
[CSO Online, August 12th, 2020]
Vulnerability Prioritization: Are You Getting It Right?
Developers must find a way to zero in on the security vulns that present the most risk and quickly address them without slowing down the pace of development
[Dark Reading, August 10th, 2020]
5 Ways To Bolster Cybersecurity Maturity
Cybersecurity is not sufficiently maturity across public-sector organizations
[GCN, August 14th, 2020]
CIOs Prioritizing IAM Over Endpoint Security And Security Awareness Training
CIOs are prioritizing identity and access management (IAM) over endpoint security and security awareness training in 2020, according to a Hitachi ID survey
[HelpNet Security, August 14th, 2020]
Gone Phishing! Organizations Don’t Have To Be Reeled In To Malicious Attacks
Research shows firms under attack from phishing, proactive detection is the answer
[ITProPortal, August 11th, 2020]
The Future Of Security: Lessons From Black Hat USA
For the last 23 years, Black Hat has been the world’s leading information security event where attendees are able to experience the latest security research, development, and trends
[Carbon Black, August 11th, 2020]