IT News: Security (269.3)

Volume 269 Issue 3

Selections from the weekly newsletter, “IT News and Events.

Why Password Policies Are A Waste Of Time And Money For Companies

Password policies aren’t adequate for corporate cybersecurity
[ITProPortal, August 18th, 2020]

Black Hat USA 2020 Recap: Experts Discuss Election Security Questions, But Offer Few Answers

The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities must address
[Dark Reading, August 20th, 2020]

7 Things To Look For In A Security Awareness Training Provider

Not all cybersecurity awareness training vendors are the same or are right for your organization. Here’s how to find the best match
[CSO Online, August 18th, 2020]

Telehealth Is The Future Of Healthcare, But How Secure Is It?

54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals
[HelpNet Security, August 19th, 2020]

16 Top Endpoint Protection Platforms

Looking for a better endpoint protection platform to protect remote staff working on Windows PCs, Macs, smartphones or even Linux? One of these might be the answer.
[CSO Online, August 17th, 2020]

Black Hat USA 2020 Musings: Weird And Wonderful Virtual Events Are Here To Stay

Black Hat USA 2020 was nothing like an in-person event, but it was incredibly useful for all involved, providing even the most grizzled industry veterans with fresh perspectives
[Dark Reading, August 20th, 2020]

10 RDP Security Best Practices To Prevent Cyberattacks

Securing remote connections is critical, especially in a pandemic. Enact these RDP security best practices at your organization to prevent ransomware, brute-force attacks and more
[SearchSecurity, August 18th, 2020]

Enterprise Cybersecurity Hygiene Checklist For 2020

Cybersecurity hygiene in the enterprise must be a shared responsibility between employees and employers. Follow these steps to get the job done by both
[SearchSecurity, August 21st. 2020]

What Are The Three Pillars Of Cybersecurity?

Cybersecurity is a business issue, not an IT issue. Organizations must foster a cybersecurity culture championed by management and supported by technology, governance, and staff awareness
[CloudSavvyIT, August 18th, 2020]

62% Of Blue Teams Have Difficulty Stopping Red Teams During Adversary Simulation Exercises

New Exabeam research shows that 62 percent of blue teams have difficulty stopping red teams during adversary simulation exercises
[HelpNet Security, August 20th, 2020]

MFA Mistakes: 6 Ways To Screw Up Multifactor Authentication

Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here’s what they need to know
[Dark Reading, August 19th, 2020]

How Organizations And Individuals Can Defend Against Would-Be Identity Thieves

Shielding against identity theft in a post-pandemic world
[techradar, August 19th, 2020]

Five Ways To Maximize FIDO

Perform a quick Google search for ’causes of data breaches’, and you will be inundated with reports of stolen credentials and weak passwords
[HelpNet Security, August 19th, 2020]

Working From Home Is Still Leading To Major Cybersecurity Issues

Since the shift to remote working, businesses have been exposed to greater cyber risk
[ITProPortal, August 21st. 2020]

How To Maintain Cybersecurity Remotely During The Pandemic

In the second 2020 MIT Sloan CIO Digital Learning Series, a panel of IT security leaders discussed how they are keeping their organizations secure in a COVID-19 environment
[SearchCIO, August 19th, 2020]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s