ITSecurity Training

4 cybersecurity maxims (General Truths)

Posted on

So i was watching youtube and wanted to find a video of a current Cybersecurity conference – instead this video made me realize that what Nick is saying has some value to repeat and expound: The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac So I reduced it to 4 because his number 5 […]

ITSecurity Training

Is Zero Trust Architecture the Method of Future Cybersecurity?

Posted on

Palo Alto Networks has a Zero trust explanation: “Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization’s network architecture. Rooted in the principle of “never trust, always verify,” Zero Trust is designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, […]

computersecuritynews

What is the Highest Risk Attack on us Right Now?

Posted on

Is it Ransomware with a shotgun approach? A shotgun approach means the attackers are sending ransomware attacks to many computers – not picking their targets, only spreading out to whatever computer will answer a certain defense profile. Or ransomware that is targeted to specific industries? Will the ransomware attacker pick on a specific industry that […]