macOS Configuration Guidance from the mSCP: Draft NIST SP 800-219r1 Available for Comment
NIST requests comments on the initial public draft of Special Publication (SP) 800-219r1, Automated Secure Configuration Guidance from the macOS…
NIST requests comments on the initial public draft of Special Publication (SP) 800-219r1, Automated Secure Configuration Guidance from the macOS…
Every CISO has encryption implementation decisions to make at a variety of levels and instances as they sort the support…
Cybersecurity tools every MSP needs (Part 2). Add these additional tools to your toolbox to quickly identify attacks, limit damage,…
On Sunday, a cryptocurrency flash loan attack on the lending platform Euler Finance resulted in the theft of $197 million…
At the heart of the GDPR (General Data Protection Regulation) is the concept of ‘personal data’. But what constitutes personal…
Two-factor authentication (2FA) has become imperative in today’s digital world, as criminals have learned to compromise almost any password. While…
Cyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from a recent…
No matter how old you are, it is important to learn how to stay safe online! According to a study…
Government entities and large organizations have been targeted by an unknown threat actor by exploiting a security flaw in Fortinet…
The latest annual FBI report on the state of cybercrime has shown a massive increase in the amount of money…