Why Anti-Malware Must Be Powered by Machine Learning

Why Anti-Malware Must Be Powered by Machine Learning

Gartner has predicted that machine learning will be a standard part of cybersecurity by 2025. The need for machine learning has become more urgent with hackers constantly developing new tools and techniques for carrying out attacks, many of which are automated to overwhelm security defenses.

Tips for Improving Website Security

Tips for Improving Website Security

Security support for an older version of the world’s most popular web programming language will end on Dec. 31, potentially exposing millions of websites to a variety of vulnerabilities. Experts say it is critical that organizations ensure they are running the last version of the PHP language.

The Top 6 Wi-Fi Threats and How to Address Them

The Top 6 Wi-Fi Threats and How to Address Them

Wi-Fi now moves more than half of all Internet traffic, and it has helped make mobile the primary digital platform for business users in the U.S. However, there’s a good chance it is the weakest link in your security chain.

As a broadcast technology, wireless is much more susceptible to hacking than wired connections.

How Privileged Account Management Reduces Security Risk

How Privileged Account Management Reduces Security Risk

In the previous post, we discussed the fact that many organizations are creating security risks by handing out local admin rights to too many users. The goal is to keep users happy by providing them with more control of their devices and reduce reliance on IT, but the convenience factor shouldn’t outweigh the security risk.

Are You Being Too Generous When Handing Out Local Admin Rights?

Are You Being Too Generous When Handing Out Local Admin Rights?

In a previous post, we discussed why access control isn't just about restricting network access to users with legitimate credentials. Access control should also restrict access to sensitive systems and data to specific users. When employees have free rein across the network, it’s like opening up a buffet for hackers who steal credentials.