Remove Cybersecurity Remove IoT Remove Network Security Remove Policy Compliance
article thumbnail

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

The Last Watchdog

From a certain perspective, 2018 hasn’t been as dramatic a cybersecurity year as 2017, in that we haven’t seen as many global pandemics like WannaCry. Still, Ransomware, zero-day exploits, and phishing attacks, were among the biggest threats facing IT security teams this year. IoT security issues will increase.

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

The edge, cloud computing, Internet of Things (IoT) devices, and more have led to a much bigger attack surface and have required new vulnerability scanning approaches and tools. These scans help organizations understand their online weaknesses and how they can be used to gain access to their network.

article thumbnail

Patch Management Policy: Steps, Benefits and a Free Template

eSecurity Planet

Any rule that does not meet compliance requirements should be adjusted to comply with requirements. However, they might find that their state’s cybersecurity requirements require monthly patching and will therefore need to change their patching frequency to monthly to comply. Overview : sets expectations and goals for the policy.