Enterprise Security

A70a600d7c593ca50cc6639cd64ed71a

Threat Intelligence: A Force Multiplier for Security Pros

March 26, 2015 Added by:Joseph Pizzo

With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.

Comments  (0)

60dcc0d0012f3056175c01d54c2e1722

Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security

March 26, 2015 Added by:Kevin Watson

The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.

Comments  (0)

6d117b57d55f63febe392e40a478011f

CSIS Issues Recommendations for Threat Intelligence Sharing

March 25, 2015 Added by:Anthony M. Freed

The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Think Like a Hacker

March 24, 2015 Added by:Javvad Malik

This was the sage advice being given out by an industry veteran in response to a question about working up the infosec ladder. I started nodding in agreement but then stopped myself mid-nod.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

You Make the Rules

March 23, 2015 Added by:PCI Guru

For years organizations have complained that they receive varying advice from different QSAs even when the QSAs are from the same firm...To address this situation, the Council is telling all PCI stakeholders that it is up to the organizations being assessed to define the rules of the assessment.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Health Insurance Firmly in the Crosshairs

March 23, 2015 Added by:Peter Zavlaris

Premera Blue Cross is the latest victim of what appears to be a long-term APT perpetrated by China. Between CHS, Anthem and now Premera Blue Cross, it’s now safe to say health insurance is firmly in the cross hairs of powerful nation state actors.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Dangers Accelerate: Increasing Global Threats Loom Over Information Security Landscape

March 19, 2015 Added by:Steve Durbin

The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

2015 Global Megatrends in Cybersecurity

March 19, 2015 Added by:Stefano Mele

The Ponemon Institute has published the "2015 Global Megatrends in Cybersecurity". Sponsored by Raytheon Company, the aim of this research is to understand the big trends or changes that will impact the security posture of organizations in both the public and private sector in the next three years.

Comments  (0)

0ead717779244d9aab5c1699308850d2

IT Security Pros Feeling the Pressure to Protect Their Environments

March 19, 2015 Added by:Brian Prince

According to a survey conducted as part of Trustwave's '2015 Security Pressures Report', 54 percent of the more than 1,000 IT professionals surveyed said they experienced more pressure to secure their network in 2014 than they did in 2013. Fifty-seven percent said they expect this year to be even worse. Just 11 percent expect the amount of pressure they face to decline.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Retail and Financial Services Sectors Wary of Insider Threats

March 18, 2015 Added by:Anthony M. Freed

The vast majority of IT leaders in the retail and financial services sectors acknowledge that their organizations are extremely vulnerable to risks posed by insider threats, including those posed by employees, privileged users, and third party partners that are part of the business’s supply chain.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

6 Architecture Considerations When Deploying PAM

March 17, 2015 Added by:Identropy

Designing a PAM archetecture for your organization will be an iterative process. Expect to repeat conversations as more factors and perspectives are brought into the conversation.

Comments  (3)

201d6e4b7cd0350a1a9ef6e856e28341

NAIC Cyber Security Principles – Not for Industrial Control Systems

March 17, 2015 Added by:Joe Weiss

There is still a significant gap in understanding of industrial control system (ICS) cyber security by many in the insurance industry.

Comments  (3)

6d117b57d55f63febe392e40a478011f

CISOs: Threat Intelligence, Big Data Analytics and Encryption are Key Technologies

March 16, 2015 Added by:Anthony M. Freed

The 2015 Global Megatrends in Cybersecurity (PDF) report – which surveyed 1,006 chief information officers, chief information security officers (CISOs) and senior IT leaders – reveals that threat intelligence-based solution will be among the key technologies employed in enterprise networks in the next three years.

Comments  (3)

Fc152e73692bc3c934d248f639d9e963

The 2015 Verizon PCI Report

March 16, 2015 Added by:PCI Guru

The Verizon report is a great read and provides a lot of insights. Everyone should get a copy and read it, take it to heart and address your organization’s security shortcomings.

Comments  (3)

65be44ae7088566069cc3bef454174a7

How Businesses Can Reduce Wearables Security & Privacy Risks

March 16, 2015 Added by:Rebecca Herold

Have you established information security and privacy policies for the use of wearable computing devices within your organization? No? Well, what are you waiting for?

Comments  (4)

Af2c9843333cc1e2578ddf18b3eed066

Lessons From Hillary Clinton's Email Security Oversight

March 16, 2015 Added by:Peter Zavlaris

Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State.

Comments  (4)

Page « < 1 - 2 - 3 - 4 - 5 > »