• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.




Guides  / Latest Cybersecurity News  / Windows security
Guide to Bug Bounty: How to implement it effectively
William Marshal Posted On January 14, 2020

Guide to Bug Bounty

Bug bounty program is a process of identifying vulnerabilities and bugs within a network or a software, organized by a company or vendor, to outsource the penetration testing and audit procedures, to supplement their internal procedures. Normally, the bug bounty comes with excellent rewards for the best bugs identified.


Continue Reading
0




Device security  / Latest Cybersecurity News  / Windows security
4 reasons enterprises should double check their USB security
William Marshal Posted On January 14, 2020


Compromised USB drives interacting with the corporate network can result in heavy damages to enterprises. System administrators need to define the right USB security management policies to identify known devices, restrict unknown devices and identify the data that is being transferred through using the USB drives


Continue Reading
0




Intruders  / Latest Cybersecurity News
Intruder detection and its benefits for security professionals
William Marshal Posted On January 13, 2020

Intruder Detection and Its Benefits

The Intrusion Detection System (IDS) is used for detecting the malicious traffic that enters the corporate network and sends an alert when such activity is observed. 


Continue Reading
0




24
Newer Posts

  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search