Securing the Human Layer

Attackers are targeting social interactions to get past one-time security gates and trained employees. Advances in natural language understanding and deep learning are...

PowerShell Security eBook

Control execution of scripts using execution policy, code signing and constrained language mode Secure PowerShell remoting with SSH und TLS Delegate administrative tasks...

AI in Cybersecurity

AI is being used in cybersecurity on both sides: by hackers to mount more sophisticated attacks and by would-be-victims to better protect and defend their systems. This...

The Promise and Reality of Cloud Security

The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the...
1 165 166 167 168 169 4,469