dcsimg

How to Search Windows Event Logs Across Hundreds of Servers

The Windows event logs are a great place to start when troubleshooting problems or investigating potential security breaches. … [Read more...]

Tenable Expands Partnership with Siemens to Secure New Power Plant Controls System

Tenable Industrial Security can now be sold, installed and managed by Siemens professional services staff, alongside the company’s SPPA-T3000 distributed control system. As attacks on critical infrastructure become more frequent and potentially more damaging, securing Operational Technology (OT) systems has become a top priority for organizations everywhere. According to the Cybersecurity in … [Read more...]

Labs Cybercrime Tactics and Techniques report finds businesses hit with 235 percent more threats in Q1

The Malwarebytes Labs Cybercrime Tactics and Techniques Q1 2019 report found businesses at the butt end of a bad joke. In just one year, threats aimed at corporate targets have increased by 235 percent, with Trojans, such as Emotet, and ransomware in particular revving up in the first quarter. Included in the report is analysis of sharp declines in consumer cryptomining and other threats, … [Read more...]

Why Group Policy Auditing is Important

It will come as no surprise that Windows out of the box isn’t secure. Many of the vulnerabilities that exist within Windows can be addressed through Group Policy Objects (GPOs). Group Policy allows administrators to control the working environment of both user and computer accounts. If used correctly, GPOs can, for example, allow you to work towards a policy of least privilege where users have … [Read more...]

Is Awingu Really the Easiest Way to Deliver Virtual Applications and Desktops?

What Is Awingu?  Awingu is a solution that aggregates applications (even legacy applications), desktops, and files hosted on servers and then delivers them to various devices, including PCs, laptops, tablets, and smartphones. It can be deployed on public cloud platforms like Amazon Web Services (AWS), Microsoft Azure, or Google Cloud, or on private clouds or on-premise datacenters.   As novel as … [Read more...]

Edge 2019: Six Things You Need to Know About Tenable’s Upcoming User Conference

At Tenable’s Edge 2019 user conference, May 21-23 in Atlanta, you’ll learn how to make the most of your product investments and gain valuable Cyber Exposure best practices all while networking with your peers, our experts, and an entire ecosystem of partners. Here’s what it’s all about. At Tenable, our customers are at the heart of everything we do. That’s why we were so delighted last year to … [Read more...]

A look inside the FBI’s 2018 IC3 online crime report

The FBI’s Internet Crime Complaint Center have released their annual Crime Report, with the most recent release focusing on 2018. While the contents may not surprise, it definitely cements some of the bigger threats to consumers and businesses—and not all of them are particularly high tech. Sometimes less is most definitely more. What is the Internet Crime Complaint Center? Good question. For … [Read more...]

Perimeter 81 Named Gartner ‘Cool Vendor’ for Network and Cyber-Physical Systems Security

Reading Time: 3 minutesTel Aviv, April 24, 2019 Perimeter 81, a leading Secure Network as a Service and zero-trust Software-Defined Perimeter (SDP) provider, announced today that it has been selected by Gartner as a “Cool Vendor in Network and Cyber-Physical Systems Security.” Perimeter 81 is designed to simplify secure network, cloud and application access in the age of … The post Perimeter … [Read more...]

Common Network Authentication Methods

Cybersecurity is perennially in the news these days. Every week it seems a different company is victimized by hackers stealing sensitive data—which is why providing robust network security for your clients is more important than ever. The paramount responsibility of a secure system is to ensure that only authorized users have access to the network. Security protocols need to let legitimate users … [Read more...]

Accelerate your compliance project with our free ISO 27001 bundle trial

The growing risk of data breaches coupled with the GDPR’s (General Data Protection Regulation) strict regulatory requirements has led many organisations to look for proven, affordable ways to achieve robust cyber security.  For many, the solution has come in the form of ISO 27001, the international standard for information security.  The most recent … [Read more...]