Security Solutions Escort Banks Through the Cloud Shift

Data is a commodity that has value just like any other: It can be used to pay for products and services (most free apps use your data in exchange for access), it can be bought and sold, and as we all know, it can change hands. Unfortunately, it doesn’t always fall into the right ones, … The post Security Solutions Escort Banks Through the Cloud Shift appeared first on Perimeter 81. … [Read more...]

Are SFTP And FTP The Same?

Nope, I haven’t lost my mind. “One is secure, the other isn’t,” you claim. But there’s more to it than that. … [Read more...]

Data Accountability and Transparency Act of 2020 looks beyond consent

In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t have to be. In June, Democratic Senator Sherrod Brown of Ohio released a discussion draft of a new data privacy bill to improve Americans’ data privacy rights and their relationship with the countless companies that collect, store, and share their personal data. While … [Read more...]

OneDrive for Business: Tips and Tricks for High-Performing Admins

This article focuses on administration and management for OneDrive for Business. Learn the hottest tips and tricks that will ensure an undisturbed workflow Read the post here: OneDrive for Business: Tips and Tricks for High-Performing Admins … [Read more...]

Keeping Customers Secure at Home or on the Road

For years, security professionals have cautioned companies against relying on traditional perimeter-based defenses. Trends like the proliferation of mobile devices, employees working remotely, and IoT devices have made it clear that the old castle-and-moat model of protecting the corporate network in a building no longer applies.  Read More … [Read more...]

Ninety-Four Percent of Organizations Have Experienced At Least One Business-Impacting Cyberattack in the Past 12 Months, According to New Industry Study

Yet only four out of 10 security leaders can answer the question, “How secure, or at risk, are we?” Tenable®, Inc., the Cyber Exposure company, published a global industry study that revealed the vast majority of organizations (94%) have experienced a business-impacting cyberattack in the past 12 months, according to both business and security executives. The data is drawn from ‘The Rise of the … [Read more...]

Aligning Cybersecurity and Business: Nobody Said It Was Easy

The bad news? There's a disconnect between business and cybersecurity. The good news? Aligning them can make all the difference. If you’ve served as a CISO, CSO or other cybersecurity leader for any length of time, you’ve likely had a CEO, board member or other senior executive ask you “how secure are we?” on a fairly frequent basis. And you also know answering that question is not as easy as it … [Read more...]

Active Directory Security Groups Best Practices

Active Directory security groups are used to give users or groups access to certain resources. If your Active Directory security groups are mis-configured or compromised, then your sensitive data could be at risk. In this article, I’m going to go through some best practices for your Active Directory security groups to ensure that you can maintain the security of your AD. Ensure Default Security … [Read more...]

How to Create a Parallels Account Using Your Apple ID

Creating a Parallels user account, managing it and logging into applications has never been easier for Apple users. They can now use their Apple ID to create a new Parallels account in a simple, fast and safe way. Using “Sign in with Apple,” you can log into your Parallels account from any device. You don’t even need to memorize a separate password for this procedure. Your Apple … [Read more...]

Ripple20: More Vulnerable Devices Discovered, Including New Vendors

A partnership between Tenable and JSOF continues to uncover additional devices vulnerable to Ripple20. Background On June 16, researchers from JSOF research lab disclosed a set of 19 vulnerabilities, dubbed “Ripple20”, which could impact millions of operational technology (OT), Internet of Things (IoT), and IT devices. The vulnerabilities exist within an embedded TCP/IP software library developed … [Read more...]