Spring into action and tidy up your digital life like a pro Security Spring is in the air and as the leaves start… rooter April 4, 2023 1 min read 0
North Korea Hacking Cryptocurrency Sites with 3CX Exploit Security News: Researchers at Russian cybersecurity firm Kaspersky today revealed that… rooter April 4, 2023 1 min read 0
UK Runs Fake DDoS-for-Hire Sites Security Brian Krebs is reporting that the UK’s National Crime Agency… rooter April 3, 2023 1 min read 0
Weekly Update 341 Security Presently sponsored by: Kolide ensures only secure devices can access… rooter April 2, 2023 2 min read 0
Avoiding data backup failures – Week in security with Tony Anscombe Security Today is World Backup Day, but maybe we also need… rooter April 1, 2023 1 min read 0
World Backup Day: Avoiding a data disaster is a forever topic Security By failing to prepare you are preparing to fail. Make… rooter April 1, 2023 1 min read 0
Friday Squid Blogging: Giant Squid vs. Blue Marlin Security Epic matchup. As usual, you can also use this squid… rooter March 31, 2023 1 min read 0
Introduce Custom Scripting for your Patching Workflow Using SanerNow Security Custom scripting in patching workflow helps organizations to back up… rooter March 31, 2023 1 min read 0
A Step-by-Step Guide to Build a Strategic Vulnerability Management Policy Security A vulnerability management policy is a set of guidelines and… rooter March 31, 2023 1 min read 0
Are Network Vulnerability Tools building your First Line of Cyber Defense? Security Even with great vulnerability management, your attack surface mitigation is… rooter March 31, 2023 1 min read 0