Cybersecurity

237

Solutions

26

Articles & Videos

562

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Related Topics

  1. Security
  2. Network Security
  3. OS Security
  4. Vulnerabilities
  5. Anti-Virus Apps
  6. Encryption
  7. Networking
  8. Windows OS
  9. Delphi
  10. Visual Basic Classic
Refine results

Hi All,

Can anyone here please let me know what's the security best practice for the SYSVOL folder in my domain controller ?
I've got about multiple (~12) Domain Controller/GlobalCatalog which is …

1453 views
Use Case: Protecting a Hybrid Cloud Infrastructure
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

I had this question after viewing Office 365 email archive feature and comparison with different 3rd party ? …

629 views

So just as doctors are bound by HIPAA/HITECH and Banks are bound by Gramm-Leach-Bliley Act, what regulatory requirements are Payroll companies bound by?

319 views
Cyber Crime
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to access all your sensitive information.
077 views

We have received several email that the Display name is our company user but the actual email address is from external email. Is there any application that can identify this kind of emails ?

In …

2284 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for McAfee Endpoint Security 10.

Many thanks in advance.

227 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for Trend Micro Office Scan 11.0.

Many thanks in advance.

232 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for Symantec Endpoint Protection 14.0.

Many thanks in advance.

223 views

Hi
 
Please provide me where I can find more information about behavior-based and anomalies detection for Microsoft System Center Endpoint Protection 4.10.
 
Many thanks in advance.

341 views

I need to send out an email to internal users about fraud emails and how to prevent / identify them. Is there any reference source / information that I can refer.

Thx

1142 views
Ransomware-A Revenue Bonanza for Service Providers
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

So, our bank identified, among others, a security vulnerability known as httpoxy. Looking at a few sites, I tried following the instructions in the websites below:

445 views

There has been patches that were missed & lapses in patching timely for non-Windows
platforms.   I noticed, Wintel was quite up to the mark on patching & I reckon this is
due patch management …

1178 views
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
0529 views

What is the best way to protect an office (1-server ,7 computers)

from getting hit with rensome and other malware?

a device (firewall) that scans all incoming packets?

I'm looking for an …

976 views

Hello to everyone,
this question might be easy for most of you but I would like to be notified by email  on every critical Vendor's vulnerabilities found.
Actually I go and check once a week on …

375 views

Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?

092 views

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your …

0308 views

windows 7
using only google chrome browser

and I am told by norton anti virus
that an exe file is safe

I am not installing a program

norton says exe is from google

am I being sent a …

5162 views

how can i create one folder on usb and require a password.


i dont want to compress a folder (zip rar) because must uncompress to view folder every time i view folder

i am using a windows 10 …

789 views
Free Tool: Port Scanner
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Hello Ee,

Recently one of my hosted web applications is getting hammered maliciously by bots  trying to post bad data etc , this occurred suddenly and this is the first time in 5 years.We have …

1166 views

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report …

0824 views

I'd like to move from our current P.O.S system and members database, to a cloud-based solution.

The company we’d like to use is ISO 27001 security accredited, they don’t store credit card info and …

682 views

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.

0212 views

What software do you recommend for
Laptop "remote wipes" or "total lockdowns"
so data cannot be taken from the harddrive
when something like the below happens
in the FUTURE ?

I assume the …

10133 views

In my wireshark evaluation of a malware from a word document, I noticed that it makes an HTTP POST to a site.
The post packet contains information about my computer.  GUID, BUILD, INFO, IP, TYPE, …

253 views
Show more content
201506-LO-Top-001

Cybersecurity

237

Solutions

26

Articles & Videos

562

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Related Topics

  1. Security
  2. Network Security
  3. OS Security
  4. Vulnerabilities
  5. Anti-Virus Apps
  6. Encryption