Blog | Cyber Security News & Training | SecuretainBlog | Cyber Security News & Training | Securetain
Menu
  • HOME
  • CYBERSECURITY
  • RISK & COMPLIANCE
  • COVID-19
  • GDPR/CCPA
  • DATA PROTECTION
21 posts

Browsing category

CYBERSECURITY

CYBERSECURITYMALWARE RANSOMWARE

Malware/Ransomware - How Do I Get Infected by Malware?

By Securetain
July 6, 2020
3 Mins read
CYBERSECURITYMALWARE RANSOMWARE

Malware/Ransomware - How Can I Tell if I Have a Malware Infection? Part III

By Securetain
July 6, 2020
2 Mins read
In this blog I am seeking readers participation to build an all-inclusive list of telltale signs of malware infection. The SecuRetain team…
CYBERSECURITY

Malware/Ransomware - How to Protect Against Malware Part IV

By Securetain
July 6, 2020
2 Mins read
The article “How to protect malware” is a must-read for everyone. Despite all their efforts, many businesses are making the news for…
CYBERSECURITY

SOAR What are you looking for? Part I

By Securetain
July 5, 2020
3 Mins read
The Securetain team recently completed a 6-part series as a guide for organizations to leverage GDPR preparation for CCPA. The Malware/Ransomware 4-part…
CYBERSECURITY

SOAR and Threat Intelligence Part II

By Securetain
July 5, 2020
3 Mins read
In part I, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, the…
CYBERSECURITY

SOAR Security Orchestration Use Cases Part III

By Securetain
July 5, 2020
3 Mins read
In part, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, we explored…
CLOUD SECURITYCLOUD SECURITY TRAININGCYBERSECURITY

Securing Cloud Data – AWS and Azure Security Part II

By Securetain
July 5, 2020
2 Mins read
In the last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security…
CLOUD SECURITYCLOUD SECURITY TRAININGCYBERSECURITY

Securing Cloud Data – Cloud Encryption Considerations Part III

By Securetain
July 5, 2020
2 Mins read
The last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security which…
CYBERSECURITYIDENTITY ACCESS MGT

Smart Doorbell and Camera Security

By Securetain
July 4, 2020
3 Mins read
The news of cameras getting hijacked is not new and these examples exemplify the IoT security crisis. After reading through different publications…
CYBERSECURITYVUNERABILITY MGT

How to Build a Manageable Vulnerability Mgt. Program Part II

By Securetain
July 4, 2020
3 Mins read
In the first article in this series, we discussed Building a Vulnerability Management program, and in this second installment, we will examine…
Page 2 of 3«123»
  • Latest posts

    • Everything You Need to Know About DoD CMMC - CMMC Background

      July 7, 2021
    • Artificial Intelligence Policy - Part II

      March 6, 2021
    • Prevention, Detection, and Recovery from Cyberattacks Part II

      February 24, 2021
    • Prevention, Detection, and Recovery from Cyberattacks Part I

      February 23, 2021
  • Popular

    • COVID-19

      COVID-19 Quick Remote Work Cyber Security Checklist

      By Securetain
      July 5, 2020
      3 Mins read
    • CYBERSECURITYIoT SECURITY

      Key Risk Indicator & Key Performance Indicators Part I

      By Securetain
      July 7, 2020
      3 Mins read
  • Subscribe and Follow

  • Categories

    AUDIO VIDEO BLOG
    5 Posts
    BCP DR
    1 Posts
    BREACH MGT
    3 Posts
    CLOUD DATA
    1 Posts
    CLOUD SECURITY
    2 Posts
    CLOUD SECURITY TRAINING
    2 Posts
    COVID-19
    11 Posts
    CYBERSECURITY
    21 Posts
    DATA PROTECTION
    3 Posts
    GDPR/CCPA
    5 Posts
    IDENTITY ACCESS MGT
    1 Posts
    IoT SECURITY
    4 Posts
    IT ADVISORY SERVICES
    1 Posts
    MALWARE RANSOMWARE
    3 Posts
    NIST
    2 Posts
    PRIVACY MGT
    5 Posts
    RISK & COMPLIANCE
    16 Posts
    RISK MGT
    3 Posts
    THIRD PARTY RISK MGT
    5 Posts
    VUNERABILITY MGT
    1 Posts
  • Latest

    • AUDIO VIDEO BLOG

      Everything You Need to Know About DoD CMMC - CMMC Background

      By superuser
      July 7, 2021
      2 Mins read
    • AUDIO VIDEO BLOG

      Artificial Intelligence Policy - Part II

      By superuser
      March 6, 2021
      3 Mins read
  • Navigation

    • HOME
    • CYBERSECURITY
    • RISK & COMPLIANCE
    • COVID-19
    • GDPR/CCPA
    • DATA PROTECTION

Copyrights © 2020 All Rights Reserved by Securetain.

  • Sign in

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

close