Blogs
Blog Computer Security

Covid-19 is Transforming Cybersecurity for Businesses

The on-going pandemic is a crucial enabler of initiating the digital transformation in cloud computing not just as an operating model but mainly as a technological shift. Many large and…

Blog Computer Security

Zoom Acquires Keybase to Add End-to-End Encryption

Could we have ever predicted that “Zoom-bombing” (similar to “photo-bombing” where a total stranger jumps in the middle of your frame as you take a selfie photo) would be a…

What We Are Reading
Article Computer Security

Browser Forensics: Google Chrome - Security Boulevard

Introduction Browsers have become an inherent part of our virtual life and we all make use of browsers for surfing the internet in some or the other way. Also, browsers can be used not only for... Go on to the site to read the full article

Article Computer Security

It’s Time to Get Serious About Managing Privileged Accounts - Security Boulevard

Managing privileged account access isn’t going to get easier, so the right strategy is more important than ever With people working from home in greater

Article Computer Security

Three Lessons from an ID Theft Kingpin’s Fraud Factory - Security Boulevard

Brian Krebs recently posted “Confessions of an ID Theft Kingpin,” recounting the cybercrime career of Hieu Minh Ngo, who began dabbling in online fraud as a teenager in his native Vietnam before operating a series of online services popular with worldwide identity thieves looking to get their hands on “fullz,” or stolen identity records containing … Continue reading "Three Lessons from an ID Theft Kingpin’s Fraud Factory" The post Three Lessons from an ID Theft Kingpin’s Fraud Factory appeared first on BehavioSec.

Article Computer Security

AWS User Management - Security Boulevard

Introduction In order to keep your AWS environment secure while allowing your users to properly utilize resources, you must ensure that users are correctly created with proper permissions. Also, you... Go on to the site to read the full article

Article Computer Security

Networking fundamentals (for Network security professionals) - Security Boulevard

Introduction To understand Network Security, it’s imperative that we understand networking fundamentals and networking basics. In this post, we will be learning about networking basics and... Go on to the site to read the full article

Article Computer Security

Browser Forensics: IE 11 - Security Boulevard

Introduction Browsers have become an inherent part of our virtual life and we all make use of browsers for surfing the internet in some or the other way. Also, browsers can be used not only for... Go on to the site to read the full article