Security Wire Daily News

Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach.

Security Wire Daily News - Mon, 04/21/2025 - 2:51pm
Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach.

Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used.

Security Wire Daily News - Mon, 04/21/2025 - 1:51pm
Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used.

A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems.

Security Wire Daily News - Mon, 04/21/2025 - 11:50am
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems.

A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks.

Security Wire Daily News - Mon, 04/21/2025 - 9:44am
A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks.

Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.

Security Wire Daily News - Fri, 04/18/2025 - 3:39pm
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.

Legacy applications create tough choices for admins who must balance business needs and security. This article covers these challenges and modernization strategies.

Security Wire Daily News - Fri, 04/18/2025 - 12:38pm
Legacy applications create tough choices for admins who must balance business needs and security. This article covers these challenges and modernization strategies.

The healthcare network's release engineering team is testing the new AI agent pairing to help with code consolidation, modernization and risk mitigation.

Security Wire Daily News - Fri, 04/18/2025 - 10:38am
The healthcare network's release engineering team is testing the new AI agent pairing to help with code consolidation, modernization and risk mitigation.

Ransomware creators have become more innovative and savvier as organizations up their defenses.

Security Wire Daily News - Fri, 04/18/2025 - 10:38am
Ransomware creators have become more innovative and savvier as organizations up their defenses.

Most businesses have a form of cyber insurance, either through cyber liability and data breach endorsements in traditional business policies or through standalone cyber policies.

Security Wire Daily News - Thu, 04/17/2025 - 1:29pm
Most businesses have a form of cyber insurance, either through cyber liability and data breach endorsements in traditional business policies or through standalone cyber policies.

Do concerns of malware, social engineering and unpatched software on employee mobile devices have you up at night? One good place to start is mobile security awareness training.

Security Wire Daily News - Thu, 04/17/2025 - 12:29pm
Do concerns of malware, social engineering and unpatched software on employee mobile devices have you up at night? One good place to start is mobile security awareness training.

Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.

Security Wire Daily News - Wed, 04/16/2025 - 3:12pm
Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.

OT systems face threats from attackers targeting their remote access capabilities. Segmenting networks is one important step. Learn other ways to safeguard your OT systems.

Security Wire Daily News - Tue, 04/15/2025 - 3:20pm
OT systems face threats from attackers targeting their remote access capabilities. Segmenting networks is one important step. Learn other ways to safeguard your OT systems.

Supply chain attacks, double extortion and RaaS are some of the ransomware trends that will continue to disrupt businesses in 2025. Is your industry a top target?

Security Wire Daily News - Tue, 04/15/2025 - 2:17pm
Supply chain attacks, double extortion and RaaS are some of the ransomware trends that will continue to disrupt businesses in 2025. Is your industry a top target?

There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work and review notable attacks and variants.

Security Wire Daily News - Mon, 04/14/2025 - 4:27pm
There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work and review notable attacks and variants.

Cloud security, or cloud computing security, is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats.

Security Wire Daily News - Mon, 04/14/2025 - 2:17pm
Cloud security, or cloud computing security, is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats.

As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.

Security Wire Daily News - Mon, 04/14/2025 - 11:09am
As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.

Sudo offers administrators a lot of flexibility. Creating custom sudo configurations can go a long way toward easing management and service upgrade challenges.

Security Wire Daily News - Mon, 04/14/2025 - 11:09am
Sudo offers administrators a lot of flexibility. Creating custom sudo configurations can go a long way toward easing management and service upgrade challenges.

Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled.

Security Wire Daily News - Mon, 04/14/2025 - 9:03am
Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled.

Negotiating with the criminals who are holding your data for ransom is a daunting and stressful endeavor. Experts weigh in on the risks and the potential outcomes.

Security Wire Daily News - Fri, 04/11/2025 - 6:01pm
Negotiating with the criminals who are holding your data for ransom is a daunting and stressful endeavor. Experts weigh in on the risks and the potential outcomes.

Pages