Security
THE 7 BENEFITS OF SSCP TO HIGHLY SUCCESSFUL SECURITY PRACTITIONERS
This post was originally published by (ISC)² Management. In a world that is constantly changing, the immediate future of emerging technologies looks exciting and promising. Rapid advances over the next five years may help humanity solve some of the biggest challenges like the climate crisis, our ability to cure illnesses, understanding the universe and our […]
Some Cloud Storage Security Tips
As work from home trend is catching up fast across the world, remote workers need to follow some tips to isolate their mobile and desktop operating systems integrated with cloud storage from hackers. Using strong and secure passwords and 2 Factor authentication- Choosing alpha-numeric passwords tucked with special characters is the best way to keep […]
Pushing Web Security to the Edge is Common Sense
This post was originally published by Jonathan Andresen. Not many people would argue with Thomas Edison’s quote, “The three great essentials to achieve anything worthwhile are, first, hard work; second, stick-to-itiveness; third, common sense.” If anything, it’s the last point – common sense – that’s been a virtue of the IT and software industry for […]
Apple iOS 14 packed with ‘Utmost’ Mobile Security features
Apple announced its iOS 14 at the Worldwide Developers Conference on Monday and made it clear that its next version of the Operating system expected to be released by next fall will be packed with ‘Utmost’ mobile security features. Firstly, the technology giant has made it clear that it will bring in significant changes to […]
Zoom app denies end to end encryption to free users
Video Conferencing app ‘Zoom’ has made it official that it will not offer end-to-end encryption to its free users as offering ciphered communication will hinder its cooperation with the police. However, all paid users are offered an advantage of encrypted communication as per the press update released by Eric Yuan, the company CEO. Genie Gebhard, […]
Android 11 and its Security and Privacy features
As users are already buying smartphones loaded with Android 10 OS, Google released a preview of its Android 11 operating system on February 19th this year which is to be likely released by the late summer on a commercial note. Some Android users who got an opportunity to use the beta version released in May […]
OVERVIEW OF THE LATEST AWS SECURITY SERVICE – AMAZON DETECTIVE
This post was originally published by(ISC)² Management. Earlier this month, AWS announced that Amazon Detective is now available to all customers, reinforcing their dedication to helping customers hold up their end of the shared responsibility model. This shared responsibility model enables your organization to alleviate the burden of responsibility for the security of the physical infrastructure of AWS […]
Tape the Webcam and enable Firewall tops Work-from-Home Cybersecurity tips
As soon as the world switched to a lockdown due to Coronavirus Pandemic, many IT companies initiated their employees to work from home to keep their critical company operations going. However, security researchers report that a new set of the challenge is created in remote working conditions as it gives a new vulnerable attack surface […]
WHITE PAPER ON CLOUD SECURITY RISKS – AND HOW TO MITIGATE THEM
This post was originally published by(ISC)² Management. Cloud security today is touted as better than ever. So how do we explain the ever-increasing number of data breaches? According to the new white paper, Cloud Security Risks & How to Mitigate Them, the disconnect arises from a shared security model. Cloud Service Providers protect the datacenter, but customers […]
THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A PROGRAM?
This post was originally published by (ISC)² Management. It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for […]