Sicurezza

22 essential Linux security commands

Pubblicato il

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo  – instead […]

Sicurezza

22 essential security commands for Linux

Pubblicato il

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo  – instead […]

Sicurezza

Tips for securing IoT on your network

Pubblicato il

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, […]

Sicurezza

Tips to improve IoT security on your network

Pubblicato il

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, […]

Sicurezza

How to eliminate the default route for greater security

Pubblicato il

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default […]

Sicurezza

Stopping ransomware starts with the security pros

Pubblicato il

Virtualization-based security software vendor Bromium surveyed security professionals about their behavior toward ransomware. The results were surprising. For example, 10 percent of them admitted to paying a ransom or hiding a breach. More alarming, 35 percent admitted to ignoring their own security protocols. After last week’s WannaCry event, these numbers may start to go down […]

Sicurezza

The CSO IoT security basics survival guide

Pubblicato il

The Internet of Things – the connecting of billions of everyday and industrial devices using tiny sensors that transmit data and share information in the cloud – is revolutionizing the way we live and do business. IoT platforms are expected to save organizations money, improve decision-making, increase staff productivity, provide better visibility into the organization […]

Sicurezza

What it takes to be a security architect

Pubblicato il

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute. Anyone in this position can expect to […]

Sicurezza

How to protect yourself in an age of insecurity

Pubblicato il

At a time where state actors have working exploits that target smart TVs and undisclosed zero-day exploits of fully patched PC and smartphone platforms, there is no question that practicing safe computing is more important than ever. While there is no silver bullet for you to protect yourself against constantly evolving security threats, there are […]

Sicurezza

Report: Bad policies and practices put data at risk [Infographic]

Pubblicato il

Almost every company has data stored in its systems that is overexposed and at risk. That’s the finding of the recently released 2017 Varonis Data Risk Report. The report is based on assessments that Varonis conducts for its customers and prospects to determine which data is at risk. The report data is aggregated and anonymized.