Stolen credentials and orphaned accounts can be abused to perform all manner of malicious activity online. Security professionals can enact many strategies to combat this situation.
It’s hard to know how many systems are already compromised by the log4j security vulnerability. It may take months or even years until we know if most critical systems were patched in time.
As employees travel during the holidays, many will be taking their work along for the journey. The surge in remote work due to the COVID-19 pandemic means that security professionals must remain vigilant this holiday season.
There are strategies for avoiding the downsides of typical micromanagement, however, by following the path of enlightened micromanagement. Here are a few tips.
Here are seven questions to ask vendors to guide your organization's evaluation of enterprise resource planning (ERP) application security, risk and compliance solutions.