December 15, 2014 Added by:Rebecca Herold
In addition to many really huge organizations, I’ve worked with hundreds of small to midsize businesses over the years. I’ve seen a large portion of the small to midsize organizations completely omitting not just one, but two and in many situations all three of these core elements.
December 12, 2014 Added by:InfosecIsland News
Please join ThreatMetrix and SecurityWeek on Thursday, Dec. 18th, 2014 at 1PM ET for a Live Webcast.
December 08, 2014 Added by:Tripwire Inc
In order to succeed, it is important to fast-track a successful plan based on establishing a solid foundation of people, process and planning.
December 05, 2014 Added by:Paul Lipman
The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...
December 04, 2014 Added by:Thu Pham
The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?
December 03, 2014 Added by:Steve Durbin
Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...
December 03, 2014 Added by:Art Coviello
I am cautiously optimistic about the prospects for collaboration and collective progress in the private sector as companies and industries are recognizing that in the digital world, no one is an island. We’re more like an archipelago and we’re starting to build bridges.
November 26, 2014 Added by:Patrick Oliver Graf
Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.
November 26, 2014 Added by:Steve Martino
While data must be protected, not all data is of equal importance and therefore not in need of the same level of protection. Security teams should consider the types of data that exist within their organizations and what security measures will work best for each.
November 25, 2014 Added by:InfosecIsland News
Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.
November 20, 2014 Added by:Identropy
Depending on the functionality and importance of your applications, databases and document folders, access should be reviewed periodically to ensure your organization is secure.
November 13, 2014 Added by:Brent Huston
Almost all organizations dread writing security policies. When I ask people why this process is so intimidating, the answer I get most often is that the task just seems overwhelming and they don’t know where to start.
November 12, 2014 Added by:Brent Huston
Scoping an enterprise-level risk assessment can be a real guessing game.
ENISA Report on Network Information Security... Iren Vonnie on 02-27-2015
The Danger of Mixing Cyber Espionage with Cy... leijon 19 on 02-27-2015
Old School On-Target NBNS Spoofing... carson Perry on 02-27-2015