4 Ways Every Employee Can Play a Role in Their Company’s Security

March 23, 2018 Added by:Tomáš Honzák

Employees can help a company avoid catastrophic data breaches and protect their own personal data more effectively.

Comments  (0)


Four Ways to Protect Your Backups from Ransomware Attacks

November 22, 2017 Added by:Rod Mathews

Backups are a last defense and control from having to pay ransom for encrypted data, but they need protection also.

Comments  (0)


Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update

October 17, 2017 Added by:James E. Lee

In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.

Comments  (0)


How to Choose the Right Data Protection Strategy

August 02, 2017 Added by:Dave Packer

A deep dive on data protection solutions and how they fit unique needs.

Comments  (0)


How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)


How Does Samba Compare to WannaCry?

July 05, 2017 Added by:Rotem Iram

Many reports are drawing comparisons between the Samba vulnerability and WannaCry, but they don't pose the same widespread risk.

Comments  (0)


What Is Your Security Canary?

April 13, 2017 Added by:Jesse McKenna

Although traditional anti-malware approaches tend to focus on looking deep within each endpoint for suspicious activity, in the case of ransomware particularly, this equates to monitoring the coal miners and when an event happens, you’ve just lost a miner.

Comments  (0)


Why Is Digital Property Monitored Less than Physical Property?

March 09, 2017 Added by:Ajit Singh

If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.

Comments  (0)


Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past

March 09, 2017 Added by:Scott Schneider

Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.

Comments  (0)


5 Signs You Need to Upgrade Your Legacy IAM

December 02, 2016 Added by:James Litton

A modern identity and access management (IAM) solution is not a multi-year journey anymore.

Comments  (0)


What It Will Really Take to Build Trust in Security Companies

September 28, 2016 Added by:Ori Eisen

If a company trusts their own product to not fail, the customer can too—with this level of trust ultimately reaching the average person. It’s a win-win-win.

Comments  (0)


What the Auto Industry Can Learn from Payments Sector about Cybersecurity

August 17, 2016 Added by:Johannes Lintzen

An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles.

Comments  (0)


Why Passwords Are the New Exploits

June 28, 2016 Added by:Nick Bilogorskiy

In the age of stolen passwords, compromised credentials are the easiest way in, simpler than phishing, malware or exploits. “Password confirmation” tools are now readily available to find reused passwords matching any website.

Comments  (0)


Six Things to Know About Computer Theft

March 15, 2016 Added by:Eyal Bek

Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.

Comments  (0)


Exploit Kits, Android Malware Dominated 2015: Dell

February 22, 2016 Added by:InfosecIsland News

Dell has released its Dell Security Annual Threat Report 2016, revealing that key trends defining the threat landscape, ranging from new, aggressive tactics employed by adversaries to a massive increase in malware attacks in 2015.

Comments  (0)


Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked