November 20, 2014 Added by:Identropy
Depending on the functionality and importance of your applications, databases and document folders, access should be reviewed periodically to ensure your organization is secure.
November 13, 2014 Added by:Brent Huston
Almost all organizations dread writing security policies. When I ask people why this process is so intimidating, the answer I get most often is that the task just seems overwhelming and they don’t know where to start.
November 12, 2014 Added by:Brent Huston
Scoping an enterprise-level risk assessment can be a real guessing game.
November 10, 2014 Added by:Electronic Frontier Foundation
In order to have confidence in any software that has security implications, we need to know that it is has been reviewed for structural design problems and is being continuously audited for bugs and vulnerabilities in the code.
November 05, 2014 Added by:Patrick Oliver Graf
To make sure remote workers are able to safely access their corporate network, administrators need to make sure that all endpoints – the company-owned devices employees use for remote work – are secure.
November 05, 2014 Added by:Steve Durbin
Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
October 30, 2014 Added by:Neohapsis
Sadly, even with sophisticated layers of defense, many organizations are facing similar thought processes of what to do “when” a data breach takes place rather than “if”.
October 28, 2014 Added by:Patrick Oliver Graf
From October 2009 through the present day, one industry alone has reported 900 different breaches. And none of those 900 were limited in their scope – in each, at least 500 individuals were affected. Who knows how many other smaller breaches happened, without public knowledge.
Cybersecurity vs. Cyber Security: When, Why ... asad ali on 01-25-2015
Who's Responsible for the Saudi Aramco Netwo... clash12121 clans on 01-24-2015
Why You Shouldn’t Use the OWASP Top 10 as ... abdul bari Chanessra on 01-24-2015