Skip to content
Thursday, June 30, 2022

TFun dot org

Information Security newsfeeds from around the world in English and French. Find it all in one place since 2004. You'll find online the last 5 years.

  • News
  • Vulnerabilities
  • Security
  • Malware
  • cybercrime
  • Alert
  • privacy
    • Privacy Policy
  • Hacking
  • Attack Maps
    • Live map

Category: best practices

Protection from Malware and AWS Bucket Leaks

27/07/2021David Clement

You can’t control the weather. But you can safeguard your downstream infrastructure investment. Source: Trend Micro

Continue Reading

5 #TrendTips for Open Source Security

15/07/2021Chuck Losh

You use many application development tools to create your next masterpiece, but you also need to ensure you’re not bringing open source security risks into the equation. Find out how in this article. Source: Trend Micro

Continue Reading

Shifting Security Left with Trend Micro and Snyk

13/07/2021Chuck Losh

Explore how to foster a DevSecOps culture by securing open source code in the early stage of the DevOps process. Source: Trend Micro

Continue Reading

The biggest mistakes people do with their personal mail boxes

06/02/202114/04/2022RedOne

We all have one or more personal mail boxes. I have plenty of them for different purposes (one for family, one for friends, one for official stuff, even temp ones or temp aliases for subscriptions to forums). We get tons of emails from friends, relatives, businesses, contractors, banks and so on. We store lot of […]

Continue Reading

Defending Against State and State-Sponsored Threat Actors

21/12/2020Saryu Nayyar

Saryu Nayyar of Gurucul discusses state and state-sponsored threat actors, the apex predators of the cybersecurity world. Source: Threatpost.com

Continue Reading

Defending the Intelligent Edge from Evolving Attacks

10/12/2020Aamir Lakhani

Fortinet’s Aamir Lakhani discusses best practices for securing company data against next-gen threats, like edge access trojans (EATs). Source: Threatpost.com

Continue Reading

Making Sense of the Security Sensor Landscape

04/12/2020Chris Calvert

Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors. Source: Threatpost.com

Continue Reading

The Enemy Within: How Insider Threats Are Changing

13/07/202013/07/2020Becky Bracken

Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk. Source: Threatpost.com The Enemy Within: How Insider Threats Are Changing

Continue Reading

Beyond Zoom: How Safe Are Slack and Other Collaboration Apps?

06/04/202006/04/2020Tara Seals

COVID-19’s effect on work footprints has created an unprecedented challenge for IT and security staff. Many departments are scrambling to enable collaboration apps for all — but without proper security they can be a big risk. Source: Threatpost.com Beyond Zoom: How Safe Are Slack and Other Collaboration Apps?

Continue Reading

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

17/03/202019/03/2020Tara Seals

COVID-19 is changing how we work. Weigh in on how your organization is securing its remote footprint with our short Threatpost poll. Source: Threatpost.com A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Continue Reading

Posts navigation

Older posts
Tfun News | Theme: News Headline by CodeVibrant.
  • News
  • Vulnerabilities
  • Security
  • Malware
  • cybercrime
  • Alert
  • privacy
    • Privacy Policy
  • Hacking
  • Attack Maps
    • Live map