Security

The top cyber stories of December 2018

The top cyber stories of December 2018 Marriott data breach The Marriott hotel group revealed that the systems of its “Starwood” division had been compromised and could have leaked detailed data on as many as half a billion customers. The Starwood group includes such major hotel brands as Sheraton, Westin and W hotels, among many […]

Continue reading

December 2018 – Microsoft Patch Tuesday

Patch Central December 2018  – Microsoft Patch Tuesday   ‘Tis the season – for decking the halls, ringing the sleigh bells, playing reindeer games, and all the other traditions that come with the month of December in many parts of the world. While others are busy shopping ‘til they drop and wrapping packages to put […]

Continue reading

Security round up

Security round up With so much cyber security news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Security round-up of the three top cyber security stories. Federal bug bounty programmes seem to pay off The United States Marine Corps is a branch of the United […]

Continue reading

The best patch management strategy for 2019

Patch management causes headaches. Just ask any IT manager or sysadmin! How do you keep all your systems patched against the never ending onslaught of security vulnerabilities?

Continue reading

Regulatory Compliance Requirements for Business Situations

Compliance is everybody’s business SMBs must be just as concerned with compliance as enterprises Regulatory compliance is a big focus for big businesses today. Privacy concerns are driving government regulation, and some industries are proactively adopting their own privately enforced rules in an effort to head off further government interference. Enterprises are in the spotlight […]

Continue reading

 “View As” Facebook hack affects 90 million users

 “View As” Facebook hack affects 90 million users In late September Facebook revealed details of a security breach they had apparently first spotted close to two weeks earlier. The problem was rooted in a feature (View as) allowing users to view their Facebook pages the way others would see them, which inadvertently allowed attackers to […]

Continue reading

Honeypot Security System Strategy

Sweeten your security strategy with a honeypot security system Implementing honeypots and honeynets as part of your network intrusion prevention/detection process   We’ve all heard the old saying that you can attract more flies with honey than with vinegar.  When the pests we’re dealing with are network attackers and intruders, most of us focus on […]

Continue reading

Consent is not enough (part 2): GDPR recordkeeping, reporting and notification requirements

Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent can be key to proving that your organization’s collection, storage, and processing of personal data of individuals is lawful under the GDPR.  Then earlier this month, in part one of the “Consent is not enough” series, I discussed […]

Continue reading

The Dark Web: Is it a threat to your organization?

As a corporate network admin or security professional, you probably think of yourself as one of the good guys in the cyber world. And that means you probably rarely venture over to the wrong side of the virtual tracks, where the bad guys hang out. Sure, you’re aware of and understand the old adage that […]

Continue reading

Consent is not enough (part 1): GDPR data security requirements

The EU’s General Data Protection Regulation has been in full force for almost three months as of this writing, but many companies are still struggling with the challenges of attaining and maintaining compliance with its numerous complex requirements. Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent […]

Continue reading

Find us on Facebook

Follow us on Twitter