Introduction to Cybersecurity for Small Businesses
In a world interwoven with digital threads, small and medium-sized enterprises (SMEs) need to navigate safely through the expansive cyberspace. While the initial introduction lays a foundation, an alignment with standardized cybersecurity controls, such as the UK...
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Introduction to Cybersecurity for Small Businesses
In a world interwoven with digital threads, small and medium-sized enterprises (SMEs) need to...
How to Protect Against Ransomware Attacks
Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom...
Gulf Countries and Data Security Breaches
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money...
Microsoft patches Zero Day vulnerability
In its latest Patch Tuesday releases, Microsoft pushed patches to fix about 20+ vulnerabilities in...
Google Hacking – FBI warns public
Google Dorking, Also known as “Google hacking,” involves using specialized search parameters...
Cloud Security Report–Spring 2014
The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download....
Whitelisting in Java
Java vulnerabilities and zero day exploits are very common these days. It has take to the extend...
Encryption and Security, think again
NSA is accused to be spying on the people for years. In a recent article, NewYork Times describes...
WireShark Tutorial
Wireshark is a one among the top sniffing tools used by any network / security analysts. Here are...
Privileged account management solutions
Privileged accounts like System Administrators and Network Administrators have elevated privileges...