Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 117

Feed: Security Magazine – Guidance

Articles recieved 01/09/2021
Article: Securing our Democracy: The case for robust campaign cybersecurity - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/92972-securing-our-democracy-the-case-for-robust-campaign-cybersecurity 
🔥🔥
 
Published: 2020 08 01 04:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Report shows $11.4M lost globally every minute to cybercrime - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93195-report-shows-114m-lost-globally-every-minute-to-cybercrime 
🔥🔥
 
Published: 2020 08 31 09:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: It’s coming: National Cybersecurity Awareness Month - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93214-its-coming-national-cybersecurity-awareness-month 
🔥🔥
 
Published: 2020 09 01 04:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Insider Threat Report: 61% of companies have had an insider attack in the past year - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93207-insider-threat-report-61-of-companies-have-had-an-insider-attack-in-the-past-year 
🔥🔥
 
Published: 2020 09 02 12:00:00
Received: 2021 09 01 13:00:28
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: More than 80% of government cybersecurity leaders say private-public partnerships a necessity - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93381-more-than-80-of-government-cybersecurity-leaders-say-private-public-partnerships-a-necessity 
🔥🔥
 
Published: 2020 09 17 12:55:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Can the voting process be hacked? - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93385-can-the-voting-process-be-hacked 
🔥🔥
 
Published: 2020 09 17 14:04:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Poor incident detection can cost your organization a fortune - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93173-poor-incident-detection-can-cost-your-organization-a-fortune 
🔥🔥
 
Published: 2020 09 24 10:00:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Mitigating digital banking security issues during the pandemic - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93221-mitigating-digital-banking-security-issues-during-the-pandemic 
🔥🔥
 
Published: 2020 09 25 09:00:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Group attribution error – The most pervasive and potentially consequential threat of our day - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93517-group-attribution-error-the-most-pervasive-and-potentially-consequential-threat-of-our-day 
🔥🔥
 
Published: 2020 10 01 04:00:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Increased enterprise security for the “new normal” working culture - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93386-increased-enterprise-security-in-the-new-normal-working-culture 
🔥🔥
 
Published: 2020 10 09 05:40:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Simple 'back-to-virtual-school' must-haves to implement in your organization - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93266-simple-back-to-virtual-school-must-haves-to-implement-in-your-organization 
🔥🔥
 
Published: 2020 10 14 08:34:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
17:00 Securing our Democracy: The case for robust campaign cybersecurity
🔥🔥
17:00 Report shows $11.4M lost globally every minute to cybercrime
🔥🔥
17:00 It’s coming: National Cybersecurity Awareness Month
🔥🔥
13:00 Insider Threat Report: 61% of companies have had an insider attack in the past year
🔥🔥
13:00 More than 80% of government cybersecurity leaders say private-public partnerships a necessity
🔥🔥
13:00 Can the voting process be hacked?
🔥🔥
13:00 Poor incident detection can cost your organization a fortune
🔥🔥
13:00 Mitigating digital banking security issues during the pandemic
🔥🔥
13:00 Group attribution error – The most pervasive and potentially consequential threat of our day
🔥🔥
13:00 Increased enterprise security for the “new normal” working culture
🔥🔥
13:00 Simple 'back-to-virtual-school' must-haves to implement in your organization
🔥🔥
Articles recieved 02/08/2021
Article: Emerging technology, evolving threats — Part I: Quantum computing - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95765-emerging-technology-evolving-threats-part-i-quantum-computing 
🔥🔥
 
Published: 2021 08 02 04:00:00
Received: 2021 08 02 10:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
10:00 Emerging technology, evolving threats — Part I: Quantum computing
🔥🔥
Articles recieved 29/07/2021
Article: Choosing the right security assessment service for your enterprise - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95738-choosing-the-right-security-assessment-service-for-your-enterprise 
🔥🔥
 
Published: 2021 07 29 04:00:00
Received: 2021 07 29 05:00:17
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Choosing the right security assessment service for your enterprise
🔥🔥
Articles recieved 26/07/2021
Article: Modernizing security with data fusion - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95710-modernizing-security-with-data-fusion 
🔥🔥
 
Published: 2021 07 26 12:43:00
Received: 2021 07 26 13:00:04
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
13:00 Modernizing security with data fusion
🔥🔥
Articles recieved 20/07/2021
Article: Ransomware prevention tactics keep businesses healthy - published almost 3 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/95671-ransomware-prevention-tactics-keep-businesses-healthy 
🔥🔥
 
Published: 2021 07 20 04:00:00
Received: 2021 07 20 05:00:14
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Ransomware prevention tactics keep businesses healthy
🔥🔥
Articles recieved 14/07/2021
Article: Using biometrics to reinvent customer authentication - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95611-using-biometrics-to-reinvent-customer-authentication 
🔥🔥
 
Published: 2021 07 14 04:00:00
Received: 2021 07 14 05:00:08
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Using biometrics to reinvent customer authentication
🔥🔥
Articles recieved 13/07/2021
Article: Fostering a healthy workplace environment in the aftermath of trauma - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95622-fostering-a-healthy-workplace-environment-in-the-aftermath-of-trauma 
🔥🔥
 
Published: 2021 07 13 04:00:00
Received: 2021 07 13 05:00:04
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Fostering a healthy workplace environment in the aftermath of trauma
🔥🔥
Articles recieved 01/07/2021
Article: Despite ransomware distractions, the insider risk continues - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95542-despite-ransomware-distractions-the-insider-risk-continues 
🔥🔥
 
Published: 2021 07 01 04:00:00
Received: 2021 07 01 06:00:31
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
06:00 Despite ransomware distractions, the insider risk continues
🔥🔥
Articles recieved 30/06/2021
Article: How to infuse agility into security operations - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95532-how-to-infuse-agility-into-security-operations 
🔥🔥
 
Published: 2021 06 30 04:00:00
Received: 2021 06 30 05:00:03
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 How to infuse agility into security operations
🔥🔥
Articles recieved 28/06/2021
Article: Secure remote access: Considerations for K-12 and universities - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95505-secure-remote-access-considerations-for-k-12-and-universities 
🔥🔥
 
Published: 2021 06 28 04:00:00
Received: 2021 06 28 05:00:28
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Secure remote access: Considerations for K-12 and universities
🔥🔥
Articles recieved 17/06/2021
Article: The reality of the shared responsibility model - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95419-the-reality-of-the-shared-responsibility-model 
🔥🔥
 
Published: 2021 06 17 04:00:00
Received: 2021 06 17 05:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 The reality of the shared responsibility model
🔥🔥
Articles recieved 16/06/2021
Article: Using risk quantification to assess cyber risk - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95409-using-risk-quantification-to-assess-cyber-risk 
🔥🔥
 
Published: 2021 06 16 04:00:00
Received: 2021 06 16 05:00:18
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Using risk quantification to assess cyber risk
🔥🔥
Articles recieved 15/06/2021
Article: The new threat economy: A guide to cybercrime’s transformation – and how to respond - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95387-the-new-threat-economy-a-guide-to-cybercrimes-transformation-and-how-to-respond 
🔥🔥
 
Published: 2021 06 15 04:00:00
Received: 2021 06 15 05:00:26
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 The new threat economy: A guide to cybercrime’s transformation – and how to respond
🔥🔥
Articles recieved 08/06/2021
Article: Law enforcement recovers $2.3 million in bitcoin paid for Colonial Pipeline ransom - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95375-law-enforcement-recovers-23-million-in-bitcoin-paid-for-colonial-pipeline-ransom 
🔥🔥
 
Published: 2021 06 08 13:49:00
Received: 2021 06 08 14:00:13
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
14:00 Law enforcement recovers $2.3 million in bitcoin paid for Colonial Pipeline ransom
🔥🔥
Articles recieved 04/06/2021
Article: IBM gives out $3 million in education security preparedness grants to schools - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95354-ibm-gives-out-3-million-in-education-security-preparedness-grants-to-schools 
🔥🔥
 
Published: 2021 06 04 04:00:00
Received: 2021 06 04 05:00:19
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 IBM gives out $3 million in education security preparedness grants to schools
🔥🔥
Articles recieved 01/06/2021
Article: Reflections in the wake of RSA 2021: Cyber resiliency - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95326-reflections-in-the-wake-of-rsa-2021-cyber-resiliency 
🔥🔥
 
Published: 2021 06 01 04:00:00
Received: 2021 06 01 15:00:21
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
15:00 Reflections in the wake of RSA 2021: Cyber resiliency
🔥🔥
Articles recieved 26/05/2021
Article: Preparing for the next elaborate cyberattack could put your organization at risk - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95276-preparing-for-the-next-elaborate-cyberattack-could-put-your-organization-at-risk 
🔥🔥
 
Published: 2021 05 26 04:00:00
Received: 2021 05 26 05:00:22
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Preparing for the next elaborate cyberattack could put your organization at risk
🔥🔥
Articles recieved 24/05/2021
Article: Not your grandmother’s ransomware - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95275-not-your-grandmothers-ransomware 
🔥🔥
 
Published: 2021 05 24 15:59:00
Received: 2021 05 24 17:00:18
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: The return of vaccinated employees with un-vaccinated computers - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95242-the-return-of-vaccinated-employees-with-un-vaccinated-computers 
🔥🔥
 
Published: 2021 05 24 04:00:00
Received: 2021 05 24 05:00:21
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
17:00 Not your grandmother’s ransomware
🔥🔥
05:00 The return of vaccinated employees with un-vaccinated computers
🔥🔥
Articles recieved 20/05/2021
Article: To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/94826-to-avoid-insider-threats-security-strategies-call-for-behavioral-profiling-and-anomaly-comparison 
🔥🔥
 
Published: 2021 05 20 04:00:00
Received: 2021 05 20 05:00:18
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison
🔥🔥
Articles recieved 19/05/2021
Article: Cybersecurity and Geopolitical podcast: Episode 4, Misinformation & Outright Conspiracy Theories - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95195-cybersecurity-and-geopolitical-podcast-episode-4-misinformation-outright-conspiracy-theories 
🔥🔥
 
Published: 2021 05 19 15:00:00
Received: 2021 05 19 18:00:24
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Protecting the enterprise against state-sponsored attacks - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/94817-protecting-the-enterprise-against-state-sponsored-attacks 
🔥🔥
 
Published: 2021 05 19 04:00:00
Received: 2021 05 19 05:00:15
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
18:00 Cybersecurity and Geopolitical podcast: Episode 4, Misinformation & Outright Conspiracy Theories
🔥🔥
05:00 Protecting the enterprise against state-sponsored attacks
🔥🔥
Articles recieved 10/05/2021
Article: Managing the 5G risks in an unified and standardized way - published almost 3 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94816-managing-the-5g-risks-in-an-unified-and-standardized-way 
🔥🔥
 
Published: 2021 05 10 04:00:00
Received: 2021 05 10 05:00:09
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Managing the 5G risks in an unified and standardized way
🔥🔥
Articles recieved 05/05/2021
Article: Exploitation in the time of COVID - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/95138-exploitation-in-the-time-of-covid 
🔥🔥
 
Published: 2021 05 05 04:00:00
Received: 2021 05 05 18:00:17
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
18:00 Exploitation in the time of COVID
🔥🔥
Articles recieved 04/05/2021
Article: Cyber leaders say penetration testing is not foolproof - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95129-cyber-leaders-say-penetration-testing-is-not-foolproof 
🔥🔥
 
Published: 2021 05 04 04:00:00
Received: 2021 05 04 15:00:17
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Cyber leaders say penetration testing is not full proof - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95129-cyber-leaders-say-penetration-testing-is-not-full-proof 
🔥🔥
 
Published: 2021 05 04 04:00:00
Received: 2021 05 04 05:00:16
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
15:00 Cyber leaders say penetration testing is not foolproof
🔥🔥
05:00 Cyber leaders say penetration testing is not full proof
🔥🔥
Articles recieved 27/04/2021
Article: 61% of organizations were infected with ransomware in 2020 - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95096-of-organizations-were-infected-with-ransomware-in-2020 
🔥🔥
 
Published: 2021 04 27 15:07:00
Received: 2021 04 27 16:00:12
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
16:00 61% of organizations were infected with ransomware in 2020
🔥🔥
Articles recieved 25/04/2021
Article: Every breath you take, they’ll be watching you - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93798-every-breath-you-take-theyll-be-watching-you 
🔥🔥
 
Published: 2020 11 01 04:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: In pursuit of diversity - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93799-in-pursuit-of-diversity 
🔥🔥
 
Published: 2020 11 01 04:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Put your cybersecurity skills to the test in a virtual battlefield - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93859-put-your-cybersecurity-skills-to-the-test-in-a-virtual-battlefield 
🔥🔥
 
Published: 2020 11 06 15:07:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: US Cyber Command-sponsored cyber exercise will focus on critical infrastructure - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93876-us-cyber-command-sponsored-cyber-exercise-will-focus-on-critical-infrastructure 
🔥🔥
 
Published: 2020 11 09 16:25:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Deepfakes could compromise your company’s security - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93476-deepfakes-could-compromise-your-companys-security 
🔥🔥
 
Published: 2020 11 12 07:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Mind the gap: Diversity & other challenges in the age of AI - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94051-mind-the-gap-diversity-other-challenges-in-the-age-of-ai 
🔥🔥
 
Published: 2020 12 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Securing all that data from your physical security and IT systems - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93760-securing-all-that-data-from-your-physical-security-and-it-systems 
🔥🔥
 
Published: 2020 12 07 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Information as a barrier to progress: aligning infosec goals with business needs - published over 3 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94101-information-as-a-barrier-to-progress-aligning-infosec-goals-with-business-needs 
🔥🔥
 
Published: 2020 12 07 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Consider these credentials when hiring a ransomware negotiator - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93919-consider-these-credentials-when-hiring-a-ransomware-negotiator 
🔥🔥
 
Published: 2020 12 08 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Tackling complacency in the GSOC - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94149-tackling-complacency-in-the-gsoc 
🔥🔥
 
Published: 2020 12 14 13:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: A first-hand account of ransomware: To pay or not to pay - published over 3 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94180-a-first-hand-account-of-ransomware-to-pay-or-not-to-pay 
🔥🔥
 
Published: 2020 12 17 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: How to use publicly available information to support enterprise security - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93934-how-to-use-publicly-available-information-to-support-enterprise-security 
🔥🔥
 
Published: 2020 12 22 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Future-proofing data against hackers - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93825-future-proofing-data-against-hackers 
🔥🔥
 
Published: 2020 12 23 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Power management: The next frontier in securing your enterprise - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93869-power-management-the-next-frontier-in-securing-your-enterprise 
🔥🔥
 
Published: 2020 12 29 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: The art of targeted phishing: How not to get hooked - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94265-the-art-of-targeted-phishing-how-not-to-get-hooked 
🔥🔥
 
Published: 2021 01 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Use threat hunting to anticipate the unknown - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94080-use-threat-hunting-to-anticipate-the-unknown 
🔥🔥
 
Published: 2021 01 08 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Five key benefits of privileged access management - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94019-five-key-benefits-of-privileged-access-management 
🔥🔥
 
Published: 2021 01 12 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: CISOs of small and medium enterprises need to rethink cybersecurity strategy - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94417-cisos-of-small-and-medium-enterprises-need-to-rethink-cybersecurity-strategy 
🔥🔥
 
Published: 2021 01 25 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: In the shadow of SolarWinds: Personal reflections - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94488-in-the-shadow-of-solarwinds-personal-reflections 
🔥🔥
 
Published: 2021 02 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: How cybercriminals use sales best practices in ransomware attacks - published about 3 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94392-how-cybercriminals-use-sales-best-practices-in-ransomware-attacks 
🔥🔥
 
Published: 2021 02 21 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Goldman Sachs joins not-for-profit TCG to define security measures and standards within FinTech - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94653-goldman-sachs-joins-not-for-profit-tcg-to-define-security-measures-and-standards-within-fintech 
🔥🔥
 
Published: 2021 02 22 15:59:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Highly skilled & well-funded: The new booming threat in cybercrime - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94722-highly-skilled-well-funded-the-new-booming-threat-in-cybercrime 
🔥🔥
 
Published: 2021 03 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: WSJ Executive Forum: Advancing security in the new business environment - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94734-wsj-executive-forum-advancing-security-in-the-new-business-environment 
🔥🔥
 
Published: 2021 05 04 13:10:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: System security: The key to optimal healthcare - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94562-system-security-the-key-to-optimal-healthcare 
🔥🔥
 
Published: 2021 03 11 05:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Defeating password spraying attacks - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94501-defeating-password-spraying-attacks 
🔥🔥
 
Published: 2021 03 23 04:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Mission-critical supply chain software: A growing operational priority - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94936-mission-critical-supply-chain-software-a-growing-operational-priority 
🔥🔥
 
Published: 2021 04 01 10:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Academic study highlights 100% rise in nation state attacks over three years - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94995-academic-study-highlights-100-rise-in-nation-state-attacks-over-three-years 
🔥🔥
 
Published: 2021 04 09 14:10:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Educational organizations are hit by phishing attacks targeting cloud data more than any other vertical - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95009-educational-organizations-are-hit-by-phishing-attacks-targeting-cloud-data-more-than-any-other-vertical 
🔥🔥
 
Published: 2021 04 13 14:47:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Rethinking cybersecurity in the age of COVID: The "Dos and Don'ts" of protection - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94799-rethinking-cybersecurity-in-the-age-of-covid-the-dos-and-donts-of-protection 
🔥🔥
 
Published: 2021 04 22 04:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Personalization and behavior modeling: a new approach to security training - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/94695-personalization-and-behavior-modeling-a-new-approach-to-security-training 
🔥🔥
 
Published: 2021 04 23 04:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
02:14 Every breath you take, they’ll be watching you
🔥🔥
02:14 In pursuit of diversity
🔥🔥
02:14 Put your cybersecurity skills to the test in a virtual battlefield
🔥🔥
02:14 US Cyber Command-sponsored cyber exercise will focus on critical infrastructure
🔥🔥
02:14 Deepfakes could compromise your company’s security
🔥🔥
02:14 Mind the gap: Diversity & other challenges in the age of AI
🔥🔥
02:14 Securing all that data from your physical security and IT systems
🔥🔥
02:14 Information as a barrier to progress: aligning infosec goals with business needs
🔥🔥
02:14 Consider these credentials when hiring a ransomware negotiator
🔥🔥
02:14 Tackling complacency in the GSOC
🔥🔥
02:14 A first-hand account of ransomware: To pay or not to pay
🔥🔥
02:14 How to use publicly available information to support enterprise security
🔥🔥
02:14 Future-proofing data against hackers
🔥🔥
02:14 Power management: The next frontier in securing your enterprise
🔥🔥
02:14 The art of targeted phishing: How not to get hooked
🔥🔥
02:14 Use threat hunting to anticipate the unknown
🔥🔥
02:14 Five key benefits of privileged access management
🔥🔥
02:14 CISOs of small and medium enterprises need to rethink cybersecurity strategy
🔥🔥
02:14 In the shadow of SolarWinds: Personal reflections
🔥🔥
02:14 How cybercriminals use sales best practices in ransomware attacks
🔥🔥
02:14 Goldman Sachs joins not-for-profit TCG to define security measures and standards within FinTech
🔥🔥
02:14 Highly skilled & well-funded: The new booming threat in cybercrime
🔥🔥
02:14 WSJ Executive Forum: Advancing security in the new business environment
🔥🔥
02:14 System security: The key to optimal healthcare
🔥🔥
02:14 Defeating password spraying attacks
🔥🔥
02:14 Mission-critical supply chain software: A growing operational priority
🔥🔥
02:14 Academic study highlights 100% rise in nation state attacks over three years
🔥🔥
02:14 Educational organizations are hit by phishing attacks targeting cloud data more than any other vertical
🔥🔥
02:14 Rethinking cybersecurity in the age of COVID: The "Dos and Don'ts" of protection
🔥🔥
02:14 Personalization and behavior modeling: a new approach to security training
🔥🔥
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 117
  • "Home" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Authors is the most poorly serviced field in the articles we see from cyber security news providers.
  • Only Published Date selections use the articles Published Date (for ordering and grouping).
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • Return to the top of this page "Go Now"

Custom HTML Block

Click to Open Code Editor