A Practical Guide to Zero-Trust Security
There are five different pillars to implement when moving to a modern, zero-trust security model.
Mobile Security – Threatpost
There are five different pillars to implement when moving to a modern, zero-trust security model.
Mobile Security – Threatpost
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
At Recorded Future, we believe every security team can benefit from threat intelligence. That’s why we’ve published “The Threat Intelligence Handbook.”
It’s aimed at helping security professionals realize the advantages of threat intelligence by offering practical steps for applying threat intelligence in any organization.
Download your free copy now.
About Recorded Future
Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open web, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future.
If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
Practical mobile device security for the road warrior
Networks Asia Employees who use their smartphones and other mobile devices while traveling face greater risk that their devices will be compromised, posing a threat to corporate systems. Travelers can minimize the risk by taking a few simple and inexpensive precautions. |
The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. Already in its third edition, Practical Packet Analysis both explains how Wireshark works and provides expert guidance on how you can use the tool to solve real-world network problems.
Yes, there are other packet analyzers, but Wireshark is one of the best, works on Windows, Mac, and Linux, and is free and open source. And, yes, there are other books, but this one focuses both on understanding the tool and using it to address the kind of problems that you’re likely to encounter.
To read this article in full or to leave a comment, please click here