Want to a security awareness program that sticks? Make it fun and personal — and offer free lunch.
from Dark Reading: https://ift.tt/2QsHRz4
via IFTTT
Want to a security awareness program that sticks? Make it fun and personal — and offer free lunch.
from Dark Reading: https://ift.tt/2QsHRz4
via IFTTT
Security researchers discuss attackers’ evolving methodologies in business email compromise and phishing campaigns.
from Dark Reading: https://ift.tt/2T0NUMl
via IFTTT
Want to a security awareness program that sticks? Make it fun and personal, and offer free lunch.
from Dark Reading: https://ift.tt/2Rw5CqD
via IFTTT
Splunk said it will integrate TruStar’s data-sharing capabilities into its Data-to-Everything platform following the acquisition.
from Dark Reading: https://ift.tt/3tXX355
via IFTTT
The FBI’s IC3 reportsCOVID-related scams and an increase in online retail may be behind the upswing in complaints.
from Dark Reading: https://ift.tt/33VMqFs
via IFTTT
Not only is relying on employees’ awareness insufficient to prevent sophisticated social engineering attacks, some training methods can create other problems.
from Dark Reading: https://ift.tt/33VU8z6
via IFTTT
Cryptographers at RSA Conference panel aren’t worried about adversarial quantum cryptography. Machine learning, though, causes pressing practical issues.
from Dark Reading: https://ift.tt/3fpYunH
via IFTTT
Small amounts of data could be sent from nearly anywhere using Apple’s “Find My” network, hidden in the large volume of traffic as AirTags become widely used, two researchers say.
from Dark Reading: https://ift.tt/3bzpe43
via IFTTT
Attackers routinely reuse stolen domain credentials. Here are some ways to thwart their access.
from Dark Reading: https://ift.tt/3fmZp8i
via IFTTT
Executives from Cisco share insights on the networking giant’s ambitious security strategy.
from Dark Reading: https://ift.tt/3eVWhBi
via IFTTT