Cyber Defense Magazine – August 2019
Fortunately, NIST and other security frameworks point to either of two publicly available configuration standards, the Security ...
For example, if some of the configuration settings of a Windows or Linux operating system on which an application operates are r ...
Dukes of CIS points to recently enacted legislation in Ohio and 2017 in California that establishes legal protections for organi ...
Virtual Private Server Market to Hit US$ 2 Billion by CONTENTS (cont') The IT & telecom sector is expected to hold a virtual ...
physical servers. The VPS service providers, such as GoDaddy, Digitalocean, and DreamHost, provide different affordable VPS plan ...
will have their own guaranteed resources (RAM, CPU), which will remain unaffected by other users on the system. The SMEs segment ...
About the Author Preeti has more than 5 years of experience in market research and consulting. She has hands on expertise in ICT ...
Stay One Step Ahead Of Hipaa Compliance By Adnan Olia, Chief Operating Officer, Intradyn HIPAA compliance is a challenge — ask a ...
In summary, HIPAA exists to protect patients’ private data against fraud and theft and dictates how that data can be distributed ...
Develop a comprehensive HIPAA disaster recovery plan. One of the administrative safeguards outlined in the HIPAA Security Rule ...
The Dangers of HTTPS: When Secure Is Not Safe By Eric H. Perkins, Sr. Security Risk Analyst, Edelman Financial Engines The web, ...
The once coveted “green lock” that was mainly used for financial transactions is now available for free to anyone; including mal ...
Going for Gold – Why Hackers Are Looking For Active Directory Golden Tickets Matt Lock, Director of Sales Engineers, Varonis Any ...
on. As in the real world, gaining such a level of access is rare, but potentially catastrophic for an organisation. However, eve ...
On the subject of privilege, organisations should implement a policy of ‘least privilege’. This states that staff only have acce ...
Overcoming Zero Trust Challenges in the Federal Government By Lisa Lorenzin, Director of Emerging Technology Solutions, Zscaler ...
Federal IT leaders should take a phased approach to simplify solutions into relevant use cases that advance mission goals. To su ...
About the Author Lisa Lorenzin is Director of Emerging Technology Solutions for the Americas at Zscaler, specializing in secure ...
Is Your Organization Driving the Getaway Car for Cybercriminals? A Reality Check on Ethics and Technology to Thwart Data Breache ...
Which begs the question: What’s the responsibility of corporations toward fraud and identity theft? Of course, organizations hav ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf