Read about the features of Ubuntu Pro, and find out how to get it on AWS.
The post Ubuntu Pro now available on Amazon Web Services appeared first on TechRepublic.
Read about the features of Ubuntu Pro, and find out how to get it on AWS.
The post Ubuntu Pro now available on Amazon Web Services appeared first on TechRepublic.
The U.K. government has released its annual Cyber Security Breaches Survey. Top cybersecurity threats, supply chain risks, incident responses and more are covered.
The post Survey: State of cybersecurity in the UK appeared first on TechRepublic.
Employees are among the biggest cybersecurity threats. They can make mistakes that may lead to cyber-attacks. Hackers and cybercriminals can also use your employees to access sensitive information. For instance, they can send phishing emails containing malicious links and attachments. That’s where security awareness training comes in. Security awareness training enables you to educate your […]
The post What To Include In Your Security Awareness Training appeared first on CyberDB.
This new vulnerability management maturity model self-assessment tool uses a series of questions to determine an organization’s maturity level across all 12 areas of the VMMM.
In this blog post, we covered eight different use cases for leveraging cloud resources and services to improve the efficiency of incident response workflows. If you want to hear a deeper discussion regarding this topic, check out the following webcast: Cloud-Powered DFIR: Harnessing the cloud to improve investigator efficiency.
Expert advice for shoring up your password practices today on this World Password Day
If you haven’t heard about the dark web yet, in this article, we will explain what it is, why people use it, and some misconceptions about it. As most people know, the surface web is easily accessible through search engines like Google, Yahoo, and Bing. However, to access the dark web, multiple software tools such […]
The post Misconceptions about the Dark Web Debunked appeared first on CyberDB.
Security is a top priority for any responsible business, but it’s usually focused on cyber threats and data breaches. While these are, of course, important, so too are the safety and security of your company’s valued staff. Are you doing all you can to create a safe work environment? By introducing these 5 innovative tech […]
The post 5 Innovative Tech Approaches to Workplace Safety and Security appeared first on CyberDB.
I’m in the digital forensics (DF) of the DFIR, the Incident Response (IR) group approach to this action would be very different. How may our actions differ? The (IR) group may be more concerned about when is the next pallet of bananas going to arrive or how does the store quell the panic when only standard bananas are available because of the organics being sold out? In the meantime, I’m standing only focused on this pallet, or maybe only the bananas I’m holding. My lifetime of eating and cyber training tells me that I am correct, but not limited to many steps in my investigation.
At the RSA Conference Akamai launched a new security platform for fake websites and touted its focus on protecting application protocol interfaces, or APIs.
The post At RSA, Akamai put focus on fake sites, API vulnerabilities appeared first on TechRepublic.