Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

Original release date: June 7, 2022

CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory (CSA) to provide information on ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Collaboration Solves the Cyber Risk to Business Risk Challenge

[Bob’s comment:  If you have taken a CISSP or other cybersecurity class from me, you already know that the CIS 20 Controls are my favorite cybersecurity framework.  Here is a new set of tools for doing a risk assessment based on the 20 Controls.]

Over the past year, the ...

Continue Reading →
0

Identifying and Authenticating Internet of Things (IoT) Objects

by Arthur Rowley

Explore what identifying and authenticating IoT (Internet of Things) is all about. This article discusses schemes available for IoT identification and authentication in depth. You will also get to know why it is essential to carry out both processes.

IoT refers to technology known as the Internet of Things. It is a transformative and beneficial ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Top 5 tips for using password managers

Password managers are a good way to keep your passwords unique, strong and safe. Tom Merritt gives us five tips on how to use them correctly


CISA and NSA Release Guidance on Selecting and Hardening VPNs

Original release date: September 28, 2021

The National Security Agency (NSA) and CISA ...

Continue Reading →
0
Page 2 of 15 12345...»