Infosecurity Blogs
How to Fix SQL Server Recovery Pending Error
Learn about the SQL Server Recovery Pending error, how to check it, and how to avoid this issue
How to Identify and Respond to a DDoS Network Attack
Three tips to help you set up your on-premises DDoS technology and prepare your team to efficiently recognize and mitigate a DDoS attack.
Governments Under Attack: Examining a New PureCrypter Campaign
Brett Raybould highlights a surge in attacks targeting the public sector, including one malware specifically designed for this purpose
A Brief History of Windows Vulnerabilities: The Evolution of Threats and Security
Understanding the evolution of Windows vulnerabilities and security is crucial in protecting your devices and data from cyber threats
Crafting Scams with AI: a Devastating New Vector
Powerful AI tools will soon be accessible to cyber-criminals, enabling the industrial automation of cyber-attacks
How to Backup and Restore Database in SQL Server
Find out why it is important to have a back up and how to create a full backup using SSMS
How Cyber-Criminals are Circumventing Multifactor Authentication
Cyber-criminals are exploiting MFA weaknesses, and it should no longer be seen as a 'silver bullet' against account takeover, says Adenike Cosgrove
Why You Don’t Need 300 Gbps DDoS Simulation Tests
Did you read about the 300Gbs DDoS attack last week? We must test our protection against an attack of that size
Will ChatGPT Democratize the Development of Evasive Malware?
Menlo Security's Brett Raybould outlines the potential cyber-threats posed by ChatGPT
How to Migrate OST to Microsoft 365
The recent Hostage Exchange Server outage is one example where the users didn’t have access to the Exchange EDB files on cloud servers and they restored mail items from the OST file
The Impact of Conversational AI on the GRC Workforce: Training our Next Generation Workers
Jenai Marinkovic and colleagues discuss the importance of teaching cybersecurity and GRC workers how to work alongside AI systems
#IWD2023: Retaining and Advancing Women in the Cyber Security Industry: Moving from Theory to Impact by Measuring Inclusion
Women in Cybersecurity has launched a study to measure the state of inclusion of women in cybersecurity
#IWD2023: DigitALL, Innovation and Technology for Gender Equality
One of the themes of this year's IWD is cracking the code and explores collaborative efforts towards gender equality
Looking Back at the Mega Breaches Trends of 2022
Paolo Passeri looks back at data on mega breaches that took place in 2022
Are You Prioritizing Digital Identity Management?
Understand the measures organizations can put in place to ensure the security of their digital infrastructure and regain control over employees’ digital identities
Why Zero Trust Isn’t a Silver Bullet for Security
It is important for organizations to recognize the limits of zero trust as they implement their security strategies
Uncover the Default Passwords Lurking in Your Active Directory
Understand how default passwords can be present in an Active Directory and provides instructions on how to check for them and how to remove them
2022: DDoS Year-in-Review
StormWall’s DDoS Year-in-Review report takes a look at the 2022 threat landscape, breaks down the industries that were most affected, and explores current DDoS trends
Not All E-Signatures Are Created Equal – Don't Get Caught Out
EU eIDAS regulation sets out three distinct types of e-signatures. Each of them has unique traits that affect their legality and enforceability. This article examines how they differ.
ChatGPT: A New Wave of Cybersecurity Concerns?
Javvad Malik discusses the cyber threats that will emanate from ChatGPT and how these risks can be mitigated