The Latest in IT Security

Posts Tagged ‘cyber defense’

We live in a reality of continually multiplying attack vectors. Hackers are using increasingly brazen methods to break past perimeter defenses, using stolen credentials and backdoors, phishing, spyware and malware, brute force, and more. Once attackers have successfully breached a network, they typically have plenty of time to do significant damage. According to the Verizon […]

Read more ...

President-elect Donald Trump plans to consult “the greatest computer minds” for input on bolstering U.S. hacking defenses, as experts say an overhaul to the country’s cybersecurity is badly needed. “We’re going to put those minds together, and we’re going to form a defense,” Trump said in a Wednesday press conference. Read More

Read more ...

The security world abounds with case studies demonstrating that end users are a weak point within the organization. End users are constantly bombarded by phishing attacks, are notorious for using weak account credentials and are preyed on by malware relying on the user to introduce malicious software into an environment. All of these examples may […]

Read more ...

Categories

WEDNESDAY, NOVEMBER 22, 2017

Featured

Archives

Latest Comments

Social Networks