Cyber Daily

The Principle of Least Privilege: The Whats, the Whys, and the Hows

The Principle of Least Privilege: The Whats, the Whys, and the Hows

According to a recent infographic, in 2020 more than 70% of cybersecurity breaches happened due to the misuse of privileges....
Read More
Implementing Application Control and Eliminating Productivity Dips

Implementing Application Control and Eliminating Productivity Dips

Application control, an integral step in achieving comprehensive endpoint security, often comes with implementation difficulties. Many organizations prioritize productivity issues...
Read More
Cybersecurity Acronyms – A Practical Glossary

Cybersecurity Acronyms – A Practical Glossary

Whether you are a cybersecurity professional, an end-user, just starting in cybersecurity or interested in the field, this cybersecurity acronym...
Read More
Avoiding Rough Patches Using Patch Management

Avoiding Rough Patches Using Patch Management

Patch management is an essential part of sustaining IT services in this era of malware and growing cyber threats. Letting...
Read More
How to Become a SOC Analyst

How to Become a SOC Analyst

A Security Operations Center, or SOC, is one of the most important departments for any modern business. It is here...
Read More

{Latest Posts}

Cyber Self-Defense

Cyber Self-Defense Is Not Complicated

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass

Read More »
DLP Technology

DLP Technology – Why Does it Fail?

Long ago, before GDPR, there was a class of technology called DLP that claimed to solve all your data leakage and data protection issues.  An acronym that stands for “data loss prevention” (it can also

Read More »