Security awareness October 2, 2019 Susan Morrow Typical goals of a behavior change program The decisions we make every day, the way we act and interact with other human beings, are based on the characteristics of human behavior that are innate or...
Security awareness September 23, 2019 Susan Morrow What you should know about Ryuk ransomware The ransomware called Ryuk has established ransomware as a lucrative enterprise product. This sentence may sound provocative, as it is treating cybercriminals...
Security awareness August 27, 2019 Penny Hoelscher OWASP Top 10 #10: Unprotected APIs [Updated 2019] Modern applications are becoming more complex, more critical and more connected. The difficulty of achieving application security has increased exponentially...
Security awareness August 27, 2019 Tyler Schultz National Cybersecurity Awareness Month made easy National Cybersecurity Awareness Month is here! Use our NCSAM Toolkit including themed posters, infographics and articles to make this October the best National Cybersecurity Awareness Month yet. Our resources are relatable, conversation and (dare I say) fun!...
Security awareness August 27, 2019 Pierluigi Paganini Modern Physical Security Awareness Is More Than Dumpster Diving [Updated 2019] The term "physical security" refers to the security measures that are put in place in order to deny unauthorized access to a facility, equipment or any other...
Security awareness August 26, 2019 Megan Sawle Mailsploit: The Undetectable Spoofing Attack [Updated 2019] Pentester Sabri Haddouche just uncovered a major new email spoofing tactic. Named Mailsploit, the technique leverages bugs in email clients and allows hackers...
Security awareness August 26, 2019 Claudio Dodt OWASP Top 10 #7: Insufficient Attack Protection [Updated 2019] “Security is always seen as too much until the day it’s not enough.” This quote by William H. Webster, an American attorney, jurist and current Chairman...
Security awareness July 15, 2019 Daniel Dimov Anti-spam legislation for system administrators Each country has its own anti-spam laws. As a result, many system administrators are confused about the laws that they need to use to find out whether emails...
Security awareness July 8, 2019 Daniel Dimov How to identify and eliminate VPN vulnerabilities In April 2019, the United States’ CERT Coordination Center released information about vulnerabilities affecting various Virtual Private Network (VPN) applications....
Security awareness July 8, 2019 Dan Virgillito What are one-time passwords and their pros and cons? When you go on a vacation, you’re probably extremely vigilant with the security of your home. You lock all the windows and doors, and even activate the...