Rapport 'De stand van e-mailbeveiliging'
Nuttige stappen om de e-mailbeveiliging en cyber resilience binnen uw organisatie te optimaliseren.
In the first Patch Tuesday of 2020, Microsoft has released a new patch for a serious Wind… Read More >
In the first Patch Tuesday of 2020, Microsoft has released a new patch for a serious Windows vulnerability, CVE-2020-0601, or the Windows CryptoAPI Spoofing Vulnerability. The vulnerability has grave implications for machines running 32- or 64-bit Windows 10 operating systems, including Windows Ser… Read More >
With the 2020 tax season unde… Read More >
With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks… Read More >
Enterprise networks thro… Read More >
Enterprise networks throughout the United States are experiencing an escalation of phishing and malware … Read More >
The Security Implications of an Apparent Memory Leak in the Microsoft Access Database Edi… Read More >
The Security Implications of an Apparent Memory Leak in the Microsoft Access Database Editor’s note: Thanks to Mimecast Research Labs’ Ofir Shlomo and Tal Dery for this discovery. In January 2019, Mimecast Research Labs discovered and disclosed CVE-2019-0560, a Microsoft Office produc… Read More >
The increasingly digital global economy has created a “perfect storm” for cybe… Read More >
The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly preying on the trust we have in these organizations. S… Read More >
Why data over-sharing is making you an easier phishing target We live in a world where sharing too much data – or the wrong data – is like asking to be hacked. It’s bad online security practice, particularly as phishing is on the ri…
Editor’s note: Elad Schulman is the co-founder and CEO of Segasec, and a speaker at the Cyber Resilience Summit in Dallas, October 28-30. Awareness of the cyber skills gap has grown in lockstep with the gap itself in recent…
“I really like the concept of cyber resilience because it genuinely helps explain what businesses need to do: detect, respond, and recover in the shortest possible amount of time.” Next week, cybersecurity experts from all around th…
Since the dawn of social engineering, attack methodology has remained largely unchanged. But the rise in electronic communications and the departure from in-person interaction has changed this dynamic. BEC attacks rose in prominence, using email frau…