Breaches
Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors
April 07, 2020 Added by:Steve Durbin
Marriott International has experienced their second data breach
Comments (0)
When Data Is Currency, Who’s Responsible for Its Security?
February 11, 2020 Added by:Jason Bevis
With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?
Comments (0)
On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure
June 04, 2019 Added by:Steve Durbin
Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware.
Comments (0)
Thoughts on DoS Attack on US Electric Utility
June 04, 2019 Added by:Phil Neray
The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.
Comments (0)
Who’s Responsible for Your Cyber-Security?
February 12, 2019 Added by:Matt Johnson
Cyber security is everybody’s responsibility – make sure that staff have the tools, and the knowledge, to do it properly.
Comments (0)
Four Technologies that will Increase Cybersecurity Risk in 2019
January 17, 2019 Added by:Srinivas Mukkamala
While advances in technology provide many benefits, they also open new threat vectors and the potential for attacks that can spread quickly over connected ecosystems.
Comments (0)
Strategies for Winning the Application Security Vulnerability Arms Race
January 17, 2019 Added by:Anna Chiang
Security and development teams need to collaborate closely to ensure that enterprise web and mobile applications are free of vulnerabilities that can lead to costly data breaches.
Comments (0)
Vote for Blockchain [Voting]
December 19, 2018 Added by:George Levy
The current voting system is ripe for change and blockchain will likely play a large role in the evolution of our electoral processes.
Comments (0)
Variations in State Data Breach Disclosure Laws Complicate Compliance
September 26, 2018 Added by:John Moran
New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.
Comments (0)
Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge
September 12, 2018 Added by:Liviu Arsene
Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.
Comments (0)
Busting the VDI Security Myth
September 11, 2018 Added by:Tal Zamir
Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.
Comments (0)
Why Admin Rights Removal Is only the First Step towards Data Protection
September 11, 2018 Added by:Andrew Avanessian
Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.
Comments (0)
Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care?
September 06, 2018 Added by:Rishi Bhargava
SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action.
Comments (0)
New Payment Tech, New Security Challenges
September 04, 2018 Added by:Simon Blake-Wilson
New apps and technologies present payment providers with new types of threats.
Comments (0)
Is User Training the Weakest Link for Your Email Security Approach?
June 28, 2018 Added by:Dennis Dillman
Security training and awareness should be at the top of your layered security strategy to ensure your employees are less of a liability, and the risk of a breach is significantly lower.
Comments (0)
Can Organisations Turn Back Time after a Cyber-Attack?
May 23, 2018 Added by:Patrice Puichaud
With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.
Comments (0)
- Cloud Security Alliance Shares Security Guidance for Crypto-Assets Exchange
- Intel Corp. to Speak at SecurityWeek Supply Chain Security Summit
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption