What We Are Reading
Explore the key practices of vulnerability management — a key component of Phase 1 of the DHS CDM Program — and learn how your agency can benefit from it.
Cybercriminals are targeting the work from anywhere workforce, which coupled with the increasingly sophisticated threat landscape underscores exactly how important endpoint security is for organizations.
Follow this advice to block malicious Office files from doing harm to your network even if you've implemented Microsoft's recommended actions.
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
SMBs typically outsource some or all their IT services to an MSP. Here’s how to find one that takes security seriously.
Cloud-based firewalls are cloud-deployed “virtual” network devices. Recently emerging as a new software-based technology, cloud firewalls are built to fulfil the same purpose, namely the prevention of unauthorized access to…
Cyber security threats are becoming more and more challenging to detect and mitigate and even more common and dangerous in their types. According to a research study on the Cost…