Security Wire Daily News

Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.

Security Wire Daily News - 3 hours 39 min ago
Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.

Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.

Security Wire Daily News - Mon, 05/19/2025 - 4:33pm
Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.

Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account.

Security Wire Daily News - Mon, 05/19/2025 - 11:13am
Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account.

A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.

Security Wire Daily News - Mon, 05/19/2025 - 10:04am
A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.

Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.

Security Wire Daily News - Mon, 05/19/2025 - 8:59am
Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.

Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.

Security Wire Daily News - Fri, 05/16/2025 - 4:15pm
Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.

A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.

Security Wire Daily News - Wed, 05/14/2025 - 2:52pm
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.

Business resilience is an organization's ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.

Security Wire Daily News - Wed, 05/14/2025 - 12:50pm
Business resilience is an organization's ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.

Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.

Security Wire Daily News - Wed, 05/14/2025 - 9:46am
Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.

To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Security Wire Daily News - Tue, 05/13/2025 - 3:18pm
To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Security Wire Daily News - Tue, 05/13/2025 - 1:15pm
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Check out the latest security news from the Informa TechTarget team.

Security Wire Daily News - Fri, 05/09/2025 - 5:22pm
Check out the latest security news from the Informa TechTarget team.

The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies.

Security Wire Daily News - Fri, 05/09/2025 - 3:20pm
The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies.

A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.

Security Wire Daily News - Fri, 05/09/2025 - 11:14am
A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.

RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security.

Security Wire Daily News - Fri, 05/09/2025 - 10:13am
RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security.

Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs for the long term.

Security Wire Daily News - Thu, 05/08/2025 - 4:35pm
Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs for the long term.

North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators.

Security Wire Daily News - Thu, 05/08/2025 - 2:26pm
North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators.

Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats.

Security Wire Daily News - Thu, 05/08/2025 - 12:23pm
Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats.

The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.

Security Wire Daily News - Thu, 05/08/2025 - 11:21am
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.

The arpwatch utility flags administrators in the event of any unexpected changes or unauthorized devices, which could signal ARP spoofing or credential-harvesting attacks.

Security Wire Daily News - Wed, 05/07/2025 - 12:45pm
The arpwatch utility flags administrators in the event of any unexpected changes or unauthorized devices, which could signal ARP spoofing or credential-harvesting attacks.

Pages