dcsimg

Defrag This – What’s the Necessary  Experience For Entry Level Cyber Security?

So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right into a security job out of school or just by getting a certification. … [Read more...]

Win10 April Update: What’s new for IT pros? (Part 2)

In the Windows 10, version 1803 update there is a group of enhancements that probably aren’t of much interest to most consumers but are significant additions for IT pros. That’s what we’ll be discussing here in Part 2. … [Read more...]

The Meltdown Never Ended: Microsoft and Google Find New Meltdown/Spectre Vuln

Well, the time has come, the latest installment in of our favorite saga is finally upon us, and we can't wait to see where the story is going next. No, I'm not talking about the Solo: A Star Wars Story, I'm talking about the saga that is the Meltdown/Spectre chip flaws, of course. … [Read more...]

Managed File Transfer – What is it?

No matter which industry sector your business operates in, facilitating collaboration among your employees, customers and business partners is a key factor in driving business process efficiencies and increasing your revenue generation potential. Collaboration requires moving information that at some point will need to leave the secure infrastructure of your organization. … [Read more...]

Exploring the virtual worlds of advergaming

Games and analytics services ran into one another headfirst recently, in a spat related to the game Conan Exiles. Developers had to remove a tracking service, which allowed game developers to track where Steam players had come from. By generating an API key and integrating it into the game, developers could figure out which ad campaigns (for example) had directed gamers to Steam at first … [Read more...]

What is an FTP Sprawl?

To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users from using non-compliant data transfer tools like Google Drive and DropBox. However, do those benefits outweigh the risks? … [Read more...]

May 2018 – Microsoft Patch Tuesday

In addition to the regular fixes, we also have a major Windows 10 update to contend with. It’s called the April 2018 update, and it was officially released and made available for download and manual installation on the last day of that month, but it didn’t start rolling out through Windows automatic updates until today (Patch Tuesday). … [Read more...]

A Year Later, Equifax Finally Reveals Full extent of Breach

A year has passed since the worst data breach of 2017, and Equifax has finally revealed the full extent of the personal data and information stolen by hackers who accessed its databases in May 2017.  … [Read more...]

GDPR final countdown: 20 quick facts at 20 days ‘til the deadline

The GDPR will go into effect in less than 20 days. We have put together 20 quick facts that will guide you in the right direction to prepare you for GDPR. Check out this list. … [Read more...]

Week in security (April 30 – May 6)

Last week on Labs, we examined the Spartacus ransomware, reported about a new tactic used by the Necurs malspam campaign, informed you about the recommended Twitter password change, and discussed engaging students to start considering careers in cybersecurity. Other news NTML credentials can be stolen via malicious Portable Document Format (PDF) files without any user interaction. (Source: … [Read more...]