Microsoft drops emergency patch after Patch Tuesday screw up

Microsoft has issued an out-of-band patch fixing an issue that caused server or client authentication failures on domain controllers after installing the 10 May 2022 Patch Tuesday updates. The Patch Tuesday issue... Read more »

Former Welsh steelworks becomes ‘living’ cyber lab

First minister of Wales Mark Drakeford has today opened a new “living” cyber security laboratory at the Thales National Digital Exploitation Centre’s (NDEC’s) £20m innovation campus on the site of the former... Read more »

Chinese cyber spooks exploit western sanctions on Russia

A Chinese nation-state threat actor has been caught conducting cyber espionage operations against two Russian defence research institutes using phishing emails that spoof the Russian Ministry of Health and contain malicious documents... Read more »

Sample file: How to use VBA to get to the beginning and the end of a Microsoft Word document

Recruiting a Security Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium includes a job description, sample interview questions... Read more »

3 Google Calendar updates that streamline events

Image: Valerie Veine/Adobe Stock In April and May 2022, Google Calendar made three subtle yet significant enhancements that support remote work. TechRepublic Academy When you configure your work location in Google Calendar,... Read more »

business continuity plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event. The BCP should state the essential functions of... Read more »

How to use Dropbox Backup to back up your files to the cloud

Using Dropbox, you can back up and restore selected folders and files online. Image: wavemovies/Adobe Stock If you’re looking for an automated way to back up your local files to the cloud,... Read more »

SANS 2022 Cloud Security Survey

Over the past several years, we have seen more and more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public cloud... Read more »

Decoding Kubernetes: Best practices from the Dutch Practice (Dutch)

Kubernetes, pretty much the platform for container orchestration, is gaining popularity. Loads of examples come from American or organizations operating worldwide. In this whitepaper we show how Kubernetes in Dutch practice works!... Read more »

Defensive cyber attacks may be justified, says attorney general

The UK’s attorney general Suella Braverman has indicated that the UK may be justified in launching defensive cyber attacks against hostile nation-states, should agreement be reached in the international community on the... Read more »