Blog


Norton Security Premium (2019) review: A minor revision of an excellent security suite

Symantec is back with an overhauled version of Norton Security for 2019. Not a ton has changed since the last time we looked at Norton, but there are some differences worth noting, as well as a new look at the suite’s basic performance. Read the full article from the author’s website. Source: https://www.pcworld.com/article/3327208/security/norton-security-premium-2019-anitvirus-review.html


Microsoft to add two new Microsoft 365 security, compliance bundles to its line-up

Starting February 1, Microsoft add two new Microsoft 365 subscription bundles to its price list. These packages are aimed at business customers who might not be ready to subscribe to the highest-end Microsoft 365 E5 bundle, but who are interested in some of its security and compliance features. Read the full article from the author’s website. Source: https://www.zdnet.com/article/microsoft-to-add-two-new-microsoft-365-security-compliance-bundles-to-its-line-up/


Top 11 posts in 2018

We covered a lot of ground in 2018: from GDPR to re:Inforce and numerous feature announcements, AWS GuardDuty deep-dives to SOC reports, automated reasoning explanations, and a series of with AWS thought leaders. Read the full article from the author’s website. Source: https://aws.amazon.com/blogs/security/top-11-posts-in-2018/


Cybersecurity Guidelines Released for Healthcare

Recognizing the threat to both critical infrastructure and human health and safety in the event of a cyber-attack, the Department of Health and Human Services (HHS) recently released Health Industry Cybersecurity Practices (HICP): Managing Threats and Protecting Patients, a publication nearly two ye Read the full article from the author’s website. Source: https://www.infosecurity-magazine.com:443/news/cybersecurity-guidelines-released/


5 steps to simple role-based access control (RBAC)

Despite all of the advanced attack scenarios we face in cybersecurity today, it seems like we continue to shoot ourselves in the proverbial feet with the simple things. Read the full article from the author’s website. Source: https://www.csoonline.com/article/3060780/access-control/5-steps-to-simple-role-based-access-control.html



Hacking attacks on your router: Why the worst is yet to come

Cyber criminals are only scratching the surface when it comes to exploiting vulnerabilities in routers to conduct hacking campaigns – and the worst is yet to come, with attackers set to use compromised devices for a wider variety of malicious activities. Read the full article from the author’s website. Source: https://www.zdnet.com/article/hacking-attacks-on-your-router-why-the-worst-is-yet-to-come/



Your Security Strategy Is Only as Strong as Your Cyber Hygiene

It’s an all-too familiar scenario: An email directive to apply a patch to a web server goes ignored, and no one follows up to be sure the patch has been applied. As a result of this simple lack of cyber hygiene, the organization falls prey to a widespread strain of malware. Read the full article from the author’s website. Source: https://securityintelligence.com/your-security-strategy-is-only-as-strong-as-your-cyber-hygiene/