Feed aggregator

Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat.
Categories: Security Wire Weekly

The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
Categories: Security Wire Weekly

Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.
Categories: Security Wire Weekly

A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web.
Categories: Security Wire Weekly

Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users.
Categories: Security Wire Weekly

IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
Categories: Security Wire Weekly

Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints.
Categories: Security Wire Weekly

One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help.
Categories: Security Wire Weekly

Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them.
Categories: Security Wire Weekly

Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or...

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or alarm) system.
Categories: Security Wire Weekly

Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust.
Categories: Security Wire Weekly

Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ.
Categories: Security Wire Weekly

You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools.

Security Wire Weekly - Wed, 04/02/2025 - 4:49pm
You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools.
Categories: Security Wire Weekly

A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.

Security Wire Daily News - Wed, 04/02/2025 - 4:49pm
A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.

An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.

Security Wire Daily News - Wed, 04/02/2025 - 4:49pm
An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.

While AI PCs show legitimate promise, the rock-solid use cases haven't been as prominent. However, security vendor ESET is showing more concrete applications of this technology.

Security Wire Daily News - Wed, 04/02/2025 - 4:49pm
While AI PCs show legitimate promise, the rock-solid use cases haven't been as prominent. However, security vendor ESET is showing more concrete applications of this technology.

IAM is critical to an organization's data security posture, and its role in regulatory compliance is just as crucial.

Security Wire Daily News - Wed, 04/02/2025 - 4:49pm
IAM is critical to an organization's data security posture, and its role in regulatory compliance is just as crucial.

AI PCs have struggled to find a perfect use case, but the need for stronger security systems on local desktops, along with agentic AI might end that struggle.

Security Wire Daily News - Wed, 04/02/2025 - 4:49pm
AI PCs have struggled to find a perfect use case, but the need for stronger security systems on local desktops, along with agentic AI might end that struggle.

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

Security Wire Daily News - Wed, 04/02/2025 - 4:49pm
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices.

Security Wire Daily News - Wed, 04/02/2025 - 4:49pm
When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices.

Pages