e-Guardian - Cyber Seguranca - Proofpoint

  • How deception technologies use camouflage to attract attackers | Salted Hash Ep 26
    on 22/05/2018 at 10:00 am

    Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies. […]

  • 22 essential Linux security commands
    by Sandra Henry-Stocker on 22/05/2018 at 10:00 am

    There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.sudo Running privileged commands with sudo  – instead of switching user to root  – is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes. Your access to the sudo command depends on settings in the /etc/sudoers and /etc/group files. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] $ sudo adduser shark Adding user `shark' ... Adding new group `shark' (1007) ... Adding new user `shark' (1007) with group `shark' ... Creating home directory `/home/shark' ... Copying files from `/etc/skel' ... Enter new UNIX password: Retype new UNIX password: passwd: password updated successfully Changing the user information for shark Enter the new value, or press ENTER for the default Full Name []: shark Room Number []: Work Phone []: Home Phone []: Other []: Is the information correct? [Y/n] Y If you run sudo and ask who you are, for example, you'll get confirmation that you're running the command as root.To read this article in full, please click here(Insider Story) […]

  • Asigra evolves backup/recovery to address security, compliance needs
    by Linda Musthaler on 21/05/2018 at 2:36 pm

    As backup and recovery products and solutions evolve, they are beginning to intersect with security and compliance. Online backup and recovery software company Asigra has announced a new version of its software that addresses the risks posed by ransomware and non-compliance with Article 17 of the European Union’s General Data Protection Regulation (GDPR). Both should be a concern for organizations of all sizes, from global enterprises on down to small/medium businesses.Let’s take a look at the new capabilities that Asigra is bringing to market with the version 14 release of its Cloud Backup software, and why these capabilities are an important evolution in backup and recovery.To read this article in full, please click her […]

  • Asigra evolves backup/recovery to address security, compliance needs
    by Linda Musthaler on 21/05/2018 at 2:36 pm

    As backup and recovery products and solutions evolve, they are beginning to intersect with security and compliance. Online backup and recovery software company Asigra has announced a new version of its software that addresses the risks posed by ransomware and non-compliance with Article 17 of the European Union’s General Data Protection Regulation (GDPR). Both should be a concern for organizations of all sizes, from global enterprises on down to small/medium businesses.Let’s take a look at the new capabilities that Asigra is bringing to market with the version 14 release of its Cloud Backup software, and why these capabilities are an important evolution in backup and recovery.To read this article in full, please click her […]

  • Tech Talk: Prepping for GDPR
    on 18/05/2018 at 11:00 am

    CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't. […]

  • What is blockchain technology?
    on 18/05/2018 at 4:00 am

    Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago. […]

  • Cisco CEO trumpets Catalyst 9K advances, software business success
    by Michael Cooney on 17/05/2018 at 3:50 pm

    Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent.But one of the of the more interesting tidbits is that the company said it was adding some 40 Catalyst 9000 customers a day and has  added 2,700 new customers this quarter to bring the total to 5,800 customers since its introduction in 2017. The Catalyst 9000 is key to a number of Cisco’s future initiatives – one of the most important being its drive to build out its Network Intuitive plans for intent-based networking.[ Related: Getting grounded in intent-based networking] | The other is that the way its software is sold – via a variety of subscription/feature levels is a key component of its overall strategy to become a more software-oriented company.To read this article in full, please click her […]

  • Cisco CEO trumpets Catalyst 9K advances, software business success
    by Michael Cooney on 17/05/2018 at 3:50 pm

    Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent.But one of the of the more interesting tidbits is that the company said it was adding some 40 Catalyst 9000 customers a day and has  added 2,700 new customers this quarter to bring the total to 5,800 customers since its introduction in 2017. The Catalyst 9000 is key to a number of Cisco’s future initiatives – one of the most important being its drive to build out its Network Intuitive plans for intent-based networking.[ Related: Getting grounded in intent-based networking] | The other is that the way its software is sold – via a variety of subscription/feature levels is a key component of its overall strategy to become a more software-oriented company.To read this article in full, please click her […]

  • What an Apple phishing attack looks like | Salted Hash Ep 32
    on 16/05/2018 at 11:00 am

    How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake. […]

  • Get a hands-on, inside look at the dark web | Salted Hash Ep 25
    on 15/05/2018 at 1:00 pm

    Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights. […]