Security Training

F45df53d99605d46f5ae32b7bed9fe22

The Cost of a Data Breach in 2014: An Industry by Industry Breakdown

December 04, 2014 Added by:Thu Pham

The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

DLP Without DLP!?

December 03, 2014 Added by:Anton Chuvakin

As we are updating GTP DLP research, I think I noticed a disturbing trend – organizations planning what is essentially a data loss prevention project without utilizing DLP technology.

Comments  (0)

279d808ff27c98d0dff8c5f1e8a19a8e

The Security Industry and a Look Ahead

December 03, 2014 Added by:Art Coviello

I am cautiously optimistic about the prospects for collaboration and collective progress in the private sector as companies and industries are recognizing that in the digital world, no one is an island. We’re more like an archipelago and we’re starting to build bridges.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

The Three Human Failures Behind Remote Access Shortcomings

November 26, 2014 Added by:Patrick Oliver Graf

Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.

Comments  (9)

Fb2ec53c17a3a96651244839dabd6ec8

Data Classification for a Stronger Security Outlook

November 26, 2014 Added by:Steve Martino

While data must be protected, not all data is of equal importance and therefore not in need of the same level of protection. Security teams should consider the types of data that exist within their organizations and what security measures will work best for each.

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

Security or Checking a Box?

November 20, 2014 Added by:PCI Guru

What is your organization interested in? Security or checking a box? Not surprisingly, most people answer “security” and then go on to prove with their actions and words that they are only interested in checking a box.

Comments  (1)

B689dd1362bef7eb372a540d3b6e6287

Access Governance 101: Job Changes and Elevated Permissions

November 20, 2014 Added by:Identropy

Depending on the functionality and importance of your applications, databases and document folders, access should be reviewed periodically to ensure your organization is secure.

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

MSSP Client Onboarding – A Critical Process!

November 17, 2014 Added by:Anton Chuvakin

Many MSSP relationships are doomed at the on-boarding stage when the organization first becomes a customer.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Tips for Writing Good Security Policies

November 13, 2014 Added by:Brent Huston

Almost all organizations dread writing security policies. When I ask people why this process is so intimidating, the answer I get most often is that the task just seems overwhelming and they don’t know where to start.

Comments  (5)

E313765e3bec84b2852c1c758f7244b6

Three Danger Signs I Look for when Scoping Risk Assessments

November 12, 2014 Added by:Brent Huston

Scoping an enterprise-level risk assessment can be a real guessing game.

Comments  (2)

E595c1d49bf4a26f8e14ce59812af80e

7 Security Threats You May Have Overlooked

November 11, 2014 Added by:Patrick Oliver Graf

In today’s business environment, the list of overlooked network security threats is endless. Information security professionals are modern-day gladiators, tasked with defending corporate data and networks against both known and unknown threats, but no matter how skilled they are, there will always be new threats to their networks.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Preventing and Recovering From Cybercrime

November 10, 2014 Added by:Pierluigi Paganini

Prevention means to secure every single resource involved in the business processes, including personnel and IT infrastructure.

Comments  (3)

7ddc1f3000a13e4dfec28074e9e7b658

What Makes a Good Security Audit?

November 10, 2014 Added by:Electronic Frontier Foundation

In order to have confidence in any software that has security implications, we need to know that it is has been reviewed for structural design problems and is being continuously audited for bugs and vulnerabilities in the code.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

MSSP: Integrate, NOT Outsource!

November 06, 2014 Added by:Anton Chuvakin

My early research conversations with both MSSP customers and providers themselves reveal the theme: those who think “integrate, NOT outsource” usually get much more value out of the MSSP relationship.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Remote Access No More: Reddit Requires Worker Relocation Before End of Year

November 05, 2014 Added by:Patrick Oliver Graf

To make sure remote workers are able to safely access their corporate network, administrators need to make sure that all endpoints – the company-owned devices employees use for remote work – are secure.

Comments  (1)

Page « < 8 - 9 - 10 - 11 - 12 > »