Enterprises with small information security teams are being stretched to deliver upon their security strategy, unless they have taken steps to ensure business continuity,...
|
|
Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable,...
|
|
Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time-sensitive, scalable,...
|
|
Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...
|
|
With the COVID-19 pandemic forcing many businesses to start operating remotely, security is often the first to suffer. Start a training program for employees on how to...
|
|
Augment your security and training program with considerations for remote users during the COVID-19 pandemic.
|
|
There is a vulnerability at the layer 2 Wi-Fi encryption level called Kr00k (formally CVE-2019-15126 in the NIST National Vulnerability Database) affecting Broadcom and...
|
|
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found...
|
|
Qualys’ newest product, VMDR (Vulnerability Management, Detection, and Response), will be available in March and will provide an all-in-one cloud-based solution for...
|
|
While email security gateways help filter out spam, prevent data loss, and inspect for malicious content, they can be easily bypassed. Avanan has patented an API-based...
|
|