The Greatest Mobile Security Threats Facing Enterprises

As more companies embrace the growing BYOD trend, many have started issuing mobile devices to their employees to give them more flexibility over how, when and where they can carry out their duties. However, in doing so they are opening up a number of additional security risks. The first, and most obvious risk, relates to the way employees use their devices outside of the workplace. Should an … [Read more...]

Oracle’s January Critical Patch Update Addresses Nearly 300 Fixes

Oracle addresses nearly 300 vulnerabilities in the first Critical Patch Update of 2019. Background On January 15, Oracle released its Critical Patch Update, a quarterly publication of fixes for vulnerabilities. This month’s update contains nearly 300 fixes across a number of Oracle products. Analysis The Critical Patch Update for January 2019 addresses a variety of vulnerabilities. For instance, … [Read more...]

How to Manage Hardware Lifecycles as an MSP

Do you have standard refresh policies on hardware? What about a disposal policy? The life of a hardware device is more than just how long it remains in service. From budgeting and planning to final disposal, there are financial, productivity, and security concerns to address throughout the device’s lifecycle.  Here are some of the areas you need to think about when it comes to managing and … [Read more...]

How the government shutdown is influencing cybersecurity jobs

As of this writing, the government shutdown of 2019 is the longest ever in America. The only good news about this situation is that, with each passing day, a new group of people in the country seems to rediscover just how essential government services are, now that they’re unavailable. The next likely casualty is the government’s stable of cybersecurity talent. Here’s why—and … [Read more...]

Honeypots Catch Winnie-the-Pooh…And Hackers Too!

Honeypots defend digital assets by attracting cybercriminals and allowing their activities to be analyzed. … [Read more...]

Thycotic Releases Free Book: Least Privilege Cybersecurity For Dummies

New Book Provides Starting Point for IT Professionals Seeking to Limit and Control Privileges on Servers, Applications, Endpoints and More WASHINGTON, D.C., January 15, 2019 — Thycotic, provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced the release of its new book Least Privilege Cybersecurity For Dummies – available … [Read more...]

How to kick start your least privilege strategy as we begin 2019

As we open 2019, we are expecting the issue of least privilege cybersecurity to become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user credentials including usernames and passwords.  To combat the exploitation of compromised accounts, organizations increasingly recognize how … [Read more...]

Election Systems as Critical Infrastructure: Understanding Help America Vote Act Funding

In today's edition of Tenable's State and Local Government Video Blog Series, we discuss how to utilize grant funding to address the top cybersecurity concerns of state CISOs. In 2017, the profile of elections security was substantially raised when the US Department of Homeland Security (DHS) added Election Infrastructure as a cyber-resiliency Critical Infrastructure Subsector under the … [Read more...]

How to document your information security policy

Information security policies play a vital role in organisational security. Getting your policy right will give you an excellent framework to build on, making sure that all your efforts follow a single goal. But if you get it wrong, you risk neglecting key issues and exposing yourself to data breaches. To make sure you get off on the right track, we’ve taken some advice from Alan Calder and … [Read more...]

Cloud Management | Parallels RAS Discusses Poor Cloud Management

Cloud Management Companies who plunge head first into cloud computing learn it’s not always as good as promised. Instead of saving, they incur more costs than budgeted, the opposite of what they expected. In most cases, the culprit is poor cloud management, something that can be avoided. Overspending Due to Virtual Machine Sprawl One of the most significant advantages of cloud computing is the … [Read more...]