AuthorComputerworld Security

Texas ransomware attacks: to pay or not to pay? | TECH(feed)

Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet discusses the pattern of ransomware attacks on local governments, how municipalities have responded and how to prevent a ransomware attack in the first place.

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

Black Hat 2019 and DEF CON 27: What to expect at hacker summer camp | TECH(talk)

Every year, thousands of hackers arrive in Las Vegas for three large security conferences -- DEF CON, Black Hat and Bsides Las Vegas -- taking place from Monday through Sunday next week. CSO Online's J.M. Porup chats with Juliet about what to expect at the conferences' sessions and what he's looking forward to.

The latest large-scale data breach: Capital One | TECH(feed)

Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the attack that affects 100 million people. A software engineer is behind the attack and is awaiting a hearing. In this episode of TECH(feed), Juliet discusses the consequences of the attack and how to find out if you've been affected.

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can protect your enterprise from these potential attacks.

How to set up Azure AD to spot risky users

You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.

What is the dark web? And what will you find there?

The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour of the web's less mainstream regions.

How to manage Microsoft Windows BitLocker

Use these techniques to inventory your network to determine which devices have BitLocker.