Latest Blog Posts

E595c1d49bf4a26f8e14ce59812af80e

Why a User-Centric Approach is Required for Network Security

June 25, 2014 Added by:Patrick Oliver Graf

With employees demanding network access for many different types of devices, operating systems and applications, a CIO’s job has never been harder. But do employees always know what’s best for network security?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Big Data's Big Promise Isn't Here Yet

June 24, 2014 Added by:Tripwire Inc

What is interesting to me is how much hope people have for big data being the savior of the security world. I don’t believe that’s going to happen anytime soon.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Keep it Simple

June 24, 2014 Added by:PCI Guru

Let us refocus our priorities and help the vast majority of the world get secure.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

What’s the Best Tool for the Job?

June 24, 2014 Added by:Jack Daniel

I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses. That reminded me of a lesson about tools I learned many years ago.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Are Spies or Malware in our ICS Networks - Who is Really Looking?

June 23, 2014 Added by:Joe Weiss

Are spies in our ICS networks – who really knows but we really should find out.

Comments  (0)

Default-avatar

Two Signs You Should Invest in Cloud Computing Data Security

June 23, 2014 Added by:CipherCloud

The cloud is great, and the cloud is here to stay. But to enable a successful, secure cloud deployment, you'll need to rethink your existing security strategy.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Medical Device Madness - Security Suffering

June 19, 2014 Added by:Mike Meikle

If the healthcare organization deploys an operating system patch or places their standard endpoint protection on the device, they run the risk of the vendor halting support during a device issue until the offending patch or software is removed.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On SIEM Tool and Operation Metrics

June 19, 2014 Added by:Anton Chuvakin

Measuring SIEM health and operations is still an emerging art, and there is no set of accepted SIEM metrics.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Last Chance to Register for Suits and Spooks New York

June 18, 2014 Added by:Mike Lennon

Suits and Spooks NYC will feature over 20 expert speakers in the areas of financial intelligence, special operations, information security, money laundering, and the protection of critical infrastructure.

Comments  (0)

Ee445365f5f87ac6a6017afd9411a04a

What is Continuous Compliance and Assurance?

June 18, 2014 Added by:Jon Long

The phrase "Continuous Compliance" is almost meaningless without an additional reference of "Assurance." I define continuous compliance and assurance as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective results to meet information security goals.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Tips for BYOD

June 18, 2014 Added by:Brent Huston

While much has been said about products and services that are emerging around this space, I wanted to tack back to 3 quick basics that can really help, especially in small and mid-size organizations.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Prank URL Shortening Service is Good Security Basics Reminder

June 18, 2014 Added by:Malwarebytes

Of course, it pays to be vigilant when presented with a shortening service link. While it’s a useful tool to have, there have always been issues with regards to your possible final destination.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Operationalizing Cyber Requires Collaboration

June 17, 2014 Added by:InfosecIsland News

Military, government and commercial leaders will discuss national security in cyberspace at AFCEA International Cyber Symposium 2014.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Physical Security is Still a Problem

June 17, 2014 Added by:Joe Weiss

I did not think we would be able to film directly in front of large electric substations and other critical infrastructures. I was wrong.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

An Ounce of Big Data is Worth a Pound of Defense

June 17, 2014 Added by:Ali Golshan

In security circles, the concept of what constitutes prevention has shifted from as recently as five years ago, due to the growth in complexity of malware and growing maturity and sophistication of cybercriminals.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Using “Compliant” Stuff Doesn’t Result in Full Compliance

June 16, 2014 Added by:Rebecca Herold

Organizations that access, in any way, some type of personal information will likely have data protection compliance requirements with which they must comply.

Comments  (0)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »