Author Details

Internet & Network

Defining and Understanding User and Entity Behavior Analytics (UEBA)

User and Entity Behavior Analytics, or UEBA for short, provides you with a comprehensive solution for IT security while...

Read More
Data security

Defining the Principle of Least Privilege (POLP)

The Principle of Least Privilege, or POLP, is the idea that any user, program, or even process should only...

Read More
Data Protection

Why Is a Data Classification Policy Absolutely Important?

Today, data is a valuable commodity. Without it, company executives cannot make well-informed decisions, marketers won’t understand their market’s...

Read More
Leaks

Building Your Incident Response Team

In order for an organization to properly respond to a breach or incident, they need to have a proper...

Read More
Data breach

Hostinger Resets User Passwords after data breach

Hostinger web hosting provider resets all customer passwords during the weekend, after learning that an attacker has unauthorized access...

Read More
Data security

Healthcare Information Security: How to Protect Patient Data

In today’s information-centric environment, healthcare providers are one of the biggest targets for sensitive personal information. Ransomware and data...

Read More
Cyber Attacks

Adwind Spyware-as-a-Service Utility Grid Operators Attacks

A phishing campaign for grid operators uses a PDF attachment to offer spyware. A campaign aimed at a domestic...

Read More
Data security

Difference Between Data at Rest and Data in Transit

When data is actively moving from one location to another either via the internet or a private network, this...

Read More
Malware

Polymorphic Refers to a Malware’s Ability to Change

When it comes to malicious programs, polymorphic refers to a malware’s ability to change itself and its identifiable features...

Read More
Endpoint Security

Why Companies Need Endpoint Protection

Endpoint protection, also known as endpoint security, is a security solution that addresses malicious cyber-attacks from endpoint devices, such...

Read More

Page 2 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register