WHAT WE ARE READINGVIEW ALL
Article

4 tips to prevent easy attacker access to Windows networks

The Colonial Pipeline attackers likely got in using old, compromised VPN credentials. This advice will force attackers to work much harder.

Article

Eliminate compromised and weak passwords

A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.

Article

AI Will Become Better Than Humans At Hacking

It could also help us build better, more secure software.

Article

Organizations ill-equipped to deal with growing BYOD security threats - Help Net Security

As mobility and remote work environments keep growing, so do challenges from managing BYOD access to handling concerns of mobile security.

Article

Unprotected CVS database exposed sensitive customer searches - Help Net Security

Researchers have discovered an exposed online database with over a billion records belonging to American healthcare company CVS Health.

Article

Do You Know the Key to Boosting Revenues? - UC Today

One "key point to focus on is a positive end-user experience because that helps with end-user adoption. "The more people that use your product, especially in the communications space, the more likely it is to catch on and the harder it would be to make a decision that they would ...

Article

Turbocharging Teams Episode 3 - Analytics for All - UC Today

Kevin Keiller and Dino Caputo, Co-Founders of Enable UC host the latest episode of Turbocharging Teams. In this session they discuss the following: The analytics available to different job roles/ functions Usage analytics vs adoption analytics Managing Teams Channels with analytics