Security Awareness

211571f3e14099fd9a6c172426982ca5

DNC Phishing Scare Was a Training Exercise Gone Awry: Lessons Learned

October 02, 2018 Added by:Perry Carpenter

The recent phishing attack on the Democratic National Committee (DNC) was only a test conducted by the Michigan Democratic Party.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

What Exactly is Threat Hunting - and Why Does it Matter?

September 24, 2018 Added by:Troy Kent

Though there is debate over the various attributes that make up threat hunting, every SOC has the potential to engage in some level of hunting – and taking action is what’s truly important.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

It's Time to Get Real about Complex, Emerging Threats

September 12, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

130c36bd4e626734d3c3de4e43cdbb8c

Busting the VDI Security Myth

September 11, 2018 Added by:Tal Zamir

Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.

Comments  (0)

53c787f0dd688c758b5610aa09af8f13

How Secure Are Popular Finance Apps on Google Play?

September 04, 2018 Added by:Min Pyo Hong

Analysis of the top free Android finance apps on Google Play revealed critical, medium and low security vulnerabilities.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The Importance and Requirements of Privileged Access Management

August 30, 2018 Added by:Joseph Carson

The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.

Comments  (0)

3013a8d01542d3101f0a905ab013f00a

All Data is Security Data: A Shift in Thinking

August 30, 2018 Added by:Chris Jordan

Reviewing the data used in security operations shows that all data, not just security logs, are needed to operate efficiently.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

Why the World Needs Disruptive, Effective, Modern Cyber Protection

August 28, 2018 Added by:Boris Vaynberg

Companies need to look for a solution that strengthens their cyber defenses dramatically by preventing attacks before they enter and harm their organization, their customers and their brand.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Changing Security Behaviors Via a Top Down Approach

August 02, 2018 Added by:Perry Carpenter

When it comes to changing behaviors and building better security hygiene, the role of the leader is not only critical, but it is the impetus to change.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems

July 03, 2018 Added by:Steve Durbin

In the face of mounting global threats, organization must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Navigating Dangerous Waters: the Maritime Industry’s New Cybersecurity Threat as Technology Innovation Grows

July 03, 2018 Added by:Jalal Bouhdada

Here is how the maritime industry can overcome cybersecurity challenges to enter the next generation of shipping.

Comments  (0)

E51e95052d67c3df896465b1249e9432

Is User Training the Weakest Link for Your Email Security Approach?

June 28, 2018 Added by:Dennis Dillman

Security training and awareness should be at the top of your layered security strategy to ensure your employees are less of a liability, and the risk of a breach is significantly lower.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Least Privilege Access – Still at the Front Lines of Security

June 27, 2018 Added by:Jackson Shaw

The principle of least privilege is a critical component to any effective privileged access management program, but it is not the only principle.

Comments  (0)

D47111ebac9e529cc7e382f0f095f32b

"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening

June 27, 2018 Added by:Jeannie Warner

In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Every Business Can Have Visibility into Advanced and Sophisticated Attacks

June 18, 2018 Added by:Liviu Arsene

Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

4 Cybersecurity Tips for Staying Safe During the World Cup

June 13, 2018 Added by:Joseph Carson

As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »