Read all of our news, articles, reviews, and more in our company blog
Cybersecurity has a reputation for being one of the most lucrative job fields and easily accessible software to learn on. But finding reliable, traditional courses can be hard to find. Traditional college degrees and certification programs can often be expensive for professionals looking to see if cybersecurity is the right field for their career.
Open source software is a rapidly growing market because every user has access to the respective programming code, can audit what the code’s functionality does and can edit the code to fit specific requirements.
The use of managed services is growing as organizations struggle supervising multiple sophisticated software systems and advanced corporate networks. One specific area of company outsourcing is the implementation and management of cyber defenses to protect digital assets against ever-evolving security threats.
A blended attack is one of the most powerful weapons in the arsenal of a bad actor intending harm to digital assets and computing systems. A blended attack is a sophisticated cyber attack that utilizes a mix of malicious code, computer viruses, worms or Trojan horses and exploits multiple software or hardware vulnerabilities known to the attacker.
The idea of collecting data from logs and using this data for analyzing the behavior of software applications, endpoints and servers dates back to the 80s. It took over a decade for the first Security Information and Event Management (SIEM) systems to appear as an on-premise security tool that collects logs from multiple collection points to detect abnormal activity.
Choose Privacy Week, first observed by the American Library Association Office for Intellectual Freedom (OIF) in 2010, is an initiative that invites the public to have a conversation about privacy rights in a digital age. The campaign gives the public the tools they need to educate and engage , and gives them resources to think critically and make more informed choices about their privacy.
DJ Jones, Director of North American Sales at Datashield, outlines one of the biggest problems with sales in cyber security. The answer may surprise you. Today we caught DJ off guard and asked him:
Two more security issues announced surrounding Remote Code Execution against Remote Desktop Services. Microsoft released a notice today concerning two vulnerabilities, which would result in a Remote Code Execution vulnerability against the Remote Desktop Services. These are being tracked under CVE-2019-1181 and CVE-2019-1182. This is akin the previous vulnerability that we notified you on, CVE-2019-0708, aka Bluekeep.