The Center for Internet Security: Open Call for Critical Security Controls Feedback
The Center for Internet Security has published a draft of its next Critical Security Controls release and is looking for your feedback to improve.
Why Web Vulnerabilities Aren't Going Away Anytime Soon
As buzz mounts over the newly discovered and yet-to be disclosed high severity OpenSSL vulnerability, many may be wondering when the seemingly endless stream of web vulnerabilities will end. Unfortunately, that time likely won’t come soon.
Phishing - What does it look like in machine data?
In this post we take a look at how Digital Guardian and Splunk can correlate data events in real time to identify phishing attacks.
What is Social Engineering? Defining and Avoiding Common Social Engineering Threats
As social engineering attacks continue to grow in sophistication and frequency, companies should look to employee education as a first line of defense. Learn how to recognize and avoid social engineering attacks in this installment of our Data Protection 101 series.
Know Your Network First: DNS and the Power of Feature Classification
Looking to build a threat intelligence program at your company? Knowing and understanding your network is a critical first step. Let's get started!
Windows Server 2003: The Time to Act is Now
With the end of Windows Server 2003 support fast approaching, companies must act now to migrate systems where possible and secure legacy systems.
ATF Official Caught Leaking Employee Data
CNN reports that an executive at the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) was sending personnel data to a personal email account.
What is a Zero-day? A definition of Zero-day Exploits & Vulnerabilities
Zero-day vulnerabilities and exploits present a serious risk to company data. Learn more about zero-days and how to defend against them in our Data Protection 101 series.
Is Data Theft the Exception or the Rule?
A recent study of malicious activity finds data exfiltration is less common than you think – but still a big problem.
8 Tips for Securing Your Mobile Device
Mobile devices have become part of our everyday lives. While using these devices, whether it be a smartphone, tablet, or laptop, you are at risk of being a victim of a cybercrime. Here are some tips you can use to safeguard your devices against impending attacks.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!