Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A new twist on "Parental consent"

I was at breakfast the other day with some family friends, and the topic of genealogy came up. Over the past few years, various sites have sprouted up that offer to trace your origins all the way back in time; in some cases, all the way back to the eras of early human development. One of my favorite authors has actually written a book about the results of his test. The idea behind the test is simple.

Weekly Cyber Security News 31/01/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24 So far this month we’ve had quite a lot of spectacular breach announcements and the month ends on a big one. With such a large organisation it would leak eventually, no matter how hard they worked to cover it up. What everyone I suppose is now asking is ‘will there be any penalty?’:

Managing SharePoint Online and Exchange Online with PowerShell

Managing SharePoint Online and Exchange Online can be a painful task — you have to constantly switch between multiple administration centers and it’s hard to know where to go for a specific setting. Luckily, you can accomplish many tasks with PowerShell. Learning a few basic commands and scripts will make your life so much easier. In this webinar, Liam Cleary and Jeff Melnick will walk you through how to use PowerShell to.

Change Is Inevitable: Tripwire File Analyzer

One of the only things that is constant in life is change. It’s the same with cybersecurity. There are different types of changes to consider. A lot of changes in our everyday life are out of our control. It can be hard to discover, monitor and even react to change. However, when it comes to change in the world of cybersecurity, it’s possible we can manage that change in a way that can have a positive impact on our business.

Endpoint security: The key to protecting your enterprise

To operate efficiently, businesses today use numerous devices such as laptops, desktop computers, and mobile devices. Securing all these devices—collectively called endpoints—significantly improves the overall security of your enterprise’s IT network. This blog can help you get started with endpoint security. To begin with, let’s define endpoint security.

Securing your SaaS apps in 2020: 3 pillars you can't neglect

In 2010, cloud computing just started to lead the IT revolution. It’s 2020 and the cloud is already mainstream. If you’re not running your business in virtual yet, you’re missing out on huge profit opportunities and capabilities that the cloud has to offer. Adopting a cloud strategy brings better security, increased stability and overall greater flexibility for your organization.