Page 2 of 48

8 Steps for Building an IT Security Career Path Program

A cybersecurity career-path program can help with talent retention and recruitment.

8 Steps for Building an IT Security Career Path Program

A cybersecurity career-path program can help with talent retention and recruitment.

How Apple’s Safari browser can save your Christmas

While I see online ads as a necessary evil if you want to keep websites in business, I’m so annoyed at the way the latest ads services seem so focused on ruining everybody’s Christmas surprise.

The ads Grinch stole Christmas

This is what happens: Ads sites track where you go online; retailers track you too and all this information is shared. Look at an item online, see an ad for it on the next page you go to. Not only is this behavioural retargeting vastly creepy, but when it comes to Christmas these things make it impossible to keep secrets, particularly on a shared Mac. Been looking at [insert name of hot new obsessive teenage-focused product here] with a view to buying one to gift your child? Don’t be too upset if said child gets onto your computer to check their Bitcoin investment only to find themselves staring at ads for the object of their desire. Kids aren’t stupid – they know how ads work online (even if we don’t). What’s happened? Your Christmas surprise is spoiled and your teenager won’t believe in Santa Claus any more, even if they are looking for a flat Earth shadow during the next eclipse.

To read this article in full, please click here

5 more Windows admin tasks made easy with PowerShell

I’ve written a lot about Microsoft PowerShell on this site, but my favorite thing to do is show how to apply the scripting language to various tasks you already have to do as part of your regular role and responsibilities. In a previous article, I demonstrated how to accomplish five common administrative tasks using PowerShell.

To read this article in full, please click here

(Insider Story)

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Security Compliance: The Less You Spend the More You Pay

The costs of complying with data protection requirements are steep, but the costs of non-compliance are even higher, a new study shows.

Microsoft Azure AD Connect Flaw Elevates Employee Privilege

An improper default configuration gives employees unnecessary administrative privilege without their knowledge, making them ideal targets for hackers.

8 Out of 10 Employees Use Unencrypted USB Devices

Security policies for USB drivers are severely outdated or inadequate, a report finds.

Only 5% of Business Leaders Rethought Security After Equifax

Corporate leaders know little about common security threats like ransomware and phishing, driving their risk for attack.

How Good Privacy Practices Help Protect Your Company Brand

Follow these five guidelines to keep your organization's data protected.