In a previous article, I discussed the general security considerations you should incorporate into Microsoft Office 365 (O365) rollout plans. Here I would like to provide more detail regarding how you can protect your intellectual property and other sensitive data that is sent and received using O365 Exchange Online (Outlook).
Understanding NERC and its Implications on Energy and Utility Companies: As NERC's Critical Infrastructure Protection standards become more critical than ever to adhere to, here is a comprehensive breakdown of the rules and helpful terms associated with them which you can use as part of your compliance process.
Olympic Destroyer returns with a vengeance, Google again pulls virulent apps from its store, plus more headlines.
Compromises across a GDPR compliance plugin and a charitable website, plus more in this week's "5 Security Things to Know."
The Internet of Things has become the Internet of Everything, yet many businesses are behind the eight ball when it comes to defending all connected devices.
A popular banking Trojan adds new capabilities, the Pentagon makes security a bigger part of its contracts, plus more in this week's "5 Things to Know."
U.S. midterm elections are reportedly already experiencing malicious hacker activity, new Canadian law forces breached companies to come clean, plus more.
Long-awaited data breach reporting rules are in effect for Canadian private sector companies. Aside from understanding the requirements, how can you turn this new obligation into a business win?
Routers don't receive the same security love as other endpoints, despite the fact that they are increasingly entering the cross-hairs of attackers. Does that need to change?
What's making headlines in the world of infosec?
Microsoft's latest patch pack, a fake and malware-laden Flash update is making the rounds plus more in this week's "5 Security Things to Know."
It's National Cyber Security Awareness Month - a perfect time to study up on any areas where you think you may be lacking in terms of your infosec know-how. We curated a list of practical resources to help fill the gaps.
Bloomberg News alleges that Chinese spies have infiltrated the U.S. supply chain with microchips, a Google Chrome phishing campaign targets developers, plus more.
The cyberthreat landscape stretches far and wide. Get an abridged version of which threats should matter most to your business - and how to rebuff them - with a new Trustwave e-book.
The election security "crisis," ATM "wiretapping," Fancy Bear back on the prowl, plus more.
Organizations continually invest in new tools, such as Microsoft Office 365 (O365), to improve productivity. However, it is important to understand how the technology is being used and why. The following provides a high-level approach to migrating to O365 safely.
CCTV vulnerabilities opens security cameras to attack, XBash malware comes packed with all sorts of insidious capabilities, plus more.
Threat hunting is more than a buzzword, it's an opportunity to take your security to the next level.
Banking Trojan activity surges, Microsoft patches and a new take on an old (and cold) attack, plus more.
Without a digital forensic and incident response retainer, cybercriminals will pwn your balance sheet. This is especially critical for business in the retail and hospitality verticals.
Sign up to receive the latest security news and trends from Trustwave.