<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

How to Celebrate Records and Information Management Month

It's April, and that means it's Records and Information Management Month. While it's not the sexiest topic, maintaining and organizing your business's records is an essential task that often gets put on the back burner.

RDP Vulnerabilities Expose Businesses to Security Risks

Thousands of business across the country and millions of shelter-in-place employees are taking advantage of Microsoft’s Remote Desktop Protocol (RDP) to connect to remote computers, access data on in-house networked devices, and collaborate directly on a remote desktop computer.

Streaming Services' Password Sharing Culture Creates Cyber Threats

Sharing Isn't Caring: How Streaming Services' Lax Password-Sharing Culture Creates Opportunity for Cybersecurity Threats

What is a VPN?

What is a VPN and how does it work?

Threat Hunting Mental Games

Mental Games: Threat Hunting Mental Models, Strategies, and Normal Behavior In the cyber security market today, there is a lot of buzzwords, one of them is threat hunting. Many tools and services claim they have threat hunting capabilities, but in most cases, this isn’t 100% true.

How to Deploy: Carbon Black (CB) Defense Sensor

Carbon Black (CB) Defense is a distributed process monitoring tool for threat detection across enterprise networks. The Carbon Black sensor executes data capturing activities to discover suspicious activities that occur within a network. Once deployed, the CB Defense sensor stays on and always collects data that can be categorized and analyzed for suspicious activities.

Payment Card Industry Data Security Standard (PCI DSS) Compliance Overview

From local coffee shops to international e-commerce giants, the widespread adoption of credit card payments online and through mobile applications continues to grow. Such popular credit card transaction practices raise pressing questions about the overall security of online payments and ban card transactions in particular.

NetWitness: Finding the Crown Jewel of Linux

NetWitness: Finding the Crown Jewels of Linux /etc/passwd and /etc/shadow

  • 6 min read
  • Mar 23, 2020 8:15:00 AM

How to Pick an MDR Partner

Cybercrime, job openings, and vulnerable software are at an all-time high.

FortiSIEM Overview

The complexities of security management across enterprise estates consisting of virtual machines, cloud, endpoints, and IoT devices require a cybersecurity solution that protects expansive IT infrastructure.

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security