Researchers spot gaps in users’ and IT practitioners’ security habits, and between security tools and user preferences. Cybersecurity professionals, and the employees and consumers they serve, all engage in...
Read moreHackers Were Inside Citrix for Five Months
February 20 2020Networking software giant Citrix Systems says malicious hackers were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees,...
Read moreHackers Were Inside Citrix for Five Months
February 20 2020Networking software giant Citrix Systems says malicious hackers were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees,...
Read moreHow to prevent data loss on your network
February 20 2020CSO Online | Feb 19, 2020 Use these tools and techniques to protect important data from being exfiltrated from your Windows network. Copyright © 2020 IDG Communications, Inc.
Read moreHow to prevent data loss on your network
February 20 2020CSO Online | Feb 19, 2020 Use these tools and techniques to protect important data from being exfiltrated from your Windows network. Copyright © 2020 IDG Communications, Inc.
Read moreDon’t Let Iowa Bring Our Elections Back to the Stone Age
February 20 2020The voting experience should be the same whether the vote is in person, by mail, or over the Internet. Let’s not allow one bad incident stop us from finding...
Read moreDon’t Let Iowa Bring Our Elections Back to the Stone Age
February 20 2020The voting experience should be the same whether the vote is in person, by mail, or over the Internet. Let’s not allow one bad incident stop us from finding...
Read moreLumu to Emerge from Stealth at RSAC
February 19 2020The new company will focus on giving customers earlier indications of network and server compromise. Lumu, a company focused on dramatically reducing the “dwell time” of a breach, will...
Read moreLumu to Emerge from Stealth at RSAC
February 19 2020The new company will focus on giving customers earlier indications of network and server compromise. Lumu, a company focused on dramatically reducing the “dwell time” of a breach, will...
Read moreThe Missing LNK — Correlating User Search LNK files
February 19 2020Forensic investigators use LNK shortcut files to recover metadata about recently accessed files, including files deleted after the time of access. In a recent investigation, FireEye Mandiant...
Read more
Recent Comments