Understanding FERPA: How K–12 Schools Can Update Their Data Privacy Approach
TAGS: data privacy Administrators and educational staff at schools around the country understand the importance of protecting student privacy. The Family Educational Rights …Continue reading →
Is certification a reliable means of learning new IT skills and concepts?
TAGS: security certifications Earning a technology certification requires some significant investments of both money and time. Candidates purchase study materials, pay tuition for …Continue reading →
How to encrypt and secure a website using HTTPS
TAGS: HTTPS | website security Encrypting web content is nothing new: It’s been nearly 20 years since the publication of the specification for encrypting web …Continue reading →
Fact or Fallacy: Stay Up to Date on the Best Practices for Password Security
How much do you know about passwords? You might believe password authentication is old hat, and that you already know …Continue reading →
Wireshark tutorial: How to use Wireshark to sniff network traffic
TAGS: network security | Networking | Wireshark Wireshark continues to be one of the most powerful tools in a network security analyst’s toolkit. As a network packet …Continue reading →
5 Questions to Ask About Buying AI-Enabled Security Software
Security products incorporating artificial intelligence techniques may reduce the workload for human analysts,taking over the time-consuming job of correlating information sources and mining …Continue reading →
Six Niche Security Certifications
Sometimes you have to step off the beaten path to find the right certification. Let’s take a look at the …Continue reading →
SIEM vs SOAR: What?s the Difference, and Do Businesses Need Both?
The cybersecurity world is full of acronyms; it’s difficult to go an entire year without vendors beating down the door …Continue reading →
Strategies to mitigate cybersecurity incidents need holistic plans
TAGS: cybersecurity | cybersecurity incidents Cybersecurity incidents carry with them tremendous potential for financial, operational and reputational damage to organizations. To stay ahead of the …Continue reading →
Incident response: How to implement a communication plan
TAGS: cybersecurity incidents Cybersecurity incidents require careful coordination between the incident response team and a variety of internal and external stakeholders. An incident …Continue reading →