You might be interested in …

Daily NCSC-FI news followup 2020-04-13

How to protect yourself from cyberattacks that exploit Covid-19 www.pandasecurity.com/mediacenter/business/cyberattacks-exploit-covid-19/ The current coronavirus COVID-19 pandemic is changing the business landscape. The most immediate change that has been seen in many countries is the sudden increase in the amount of people working from home. Because of this change, the attack surface has increased significantly, forcing companies […]

Read More

[ThreatPost] Top Strategies That Define the Success of a Modern Vulnerability Management Program

All posts, ThreatPost

Modern vulnerability management programs require a strategy that defines what success means for your organization’s cybersecurity goals. By incorporating a few simple cyber hygiene routines to your daily security routine, you’ll set up your IT teams to be better equipped to steer off cyberattacks. Source: Read More (Threatpost)

Read More

[SANS ISC] ISC Stormcast For Monday, May 24th, 2021 https://isc.sans.edu/podcastdetail.html?id=7512, (Mon, May 24th)

All posts, Sans-ISC

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Source: Read More (SANS Internet Storm Center, InfoCON: green)

Read More