Security Training

1c7e19555c747737c9064d29ea238f27

A Model for Quantifying Cyber Risks

February 16, 2015 Added by:Robert Vamosi

What if you could predict the amount of risk your company might face from digital attacks in the coming year?

Comments  (5)

Fc152e73692bc3c934d248f639d9e963

New PCI Compliance Study

February 16, 2015 Added by:PCI Guru

Dr. Branden Williams and the Merchants Acquirer Committee (MAC) have issued a new report on PCI compliance and the impact of breaches on merchants and MAC members.

Comments  (4)

0ead717779244d9aab5c1699308850d2

PoS Malware Kits Rose in Underground in 2014: Report

February 12, 2015 Added by:Brian Prince

In 2014, while several major companies were coping with breaches of their PoS infrastructure, many smaller retailers were facing the same threat from less-organized groups.

Comments  (8)

A9b6b5a8a81a04a77ce3c809a94fda13

Breach Detection: At Least as Important as Perimeter Security

February 12, 2015 Added by:Mike Jawetz

If reactionary management of risk is inefficient and impulsive, why do most of us still do it?

Comments  (14)

Default-avatar

The Anthem Breach Lesson – A Different Perspective

February 12, 2015 Added by:Cyphort

It’s high time for us to work on adopting best security practices and start implementing a more effective posture.

Comments  (7)

Bd07d58f0d31d48d3764821d109bf165

Top 5 Malware Trends on the Horizon

February 11, 2015 Added by:Tripwire Inc

Here are 5 malware trends on the horizon that IT professionals should be on the lookout for as they impact organizations and individuals across the globe.

Comments  (12)

E3703200c88cf14d197d51bf79104675

Planning for the Unknown: 2 Key Steps to Prepare for Cyber Threats

February 11, 2015 Added by:Arabella Hallawell

Do businesses have incident response plans in place, and if so, what are some of the best practices that CSOs should implement as part of their security response plans?

Comments  (6)

B8db824b8b275afb1f4160f03cd3f733

We Need to Talk About Attribution

February 11, 2015 Added by:Jack Daniel

One of the InfoSec community’s greatest distractions lately has been attribution, both specifically and generically.

Comments  (5)

E595c1d49bf4a26f8e14ce59812af80e

Europe: More than Just ‘Stumbling Forward’ to Improved Cybersecurity

February 11, 2015 Added by:Patrick Oliver Graf

Two years ago almost to the day, months before cyberattacks entered the world’s collective consciousness, the European Union took the bold step of publishing an ambitious cybersecurity strategy. The strategy aims to outline the best path forward for identifying and responding to emerging digital threats.

Comments  (10)

B689dd1362bef7eb372a540d3b6e6287

Humanizing Non-Human High Privileged Accounts

February 10, 2015 Added by:Identropy

Every IT environment has them. They are called by a variety of names: Non-human accounts; system accounts; service accounts; administrator accounts; shared accounts; group accounts; and the list goes on. What is common is that they have exceedingly high privileges to often the most critical areas of an IT environment.

Comments  (7)

507c8b7b935d89fb00bab0609b37de42

Poor SIEM – Why Do We Doom You to Fail?

February 10, 2015 Added by:Robert Eslinger

Some say the current SIEM status quo provides no value and must evolve if it’s to survive. But I believe these views stem from a fundamental misunderstanding of what SIEM does (or should do).

Comments  (5)

F45df53d99605d46f5ae32b7bed9fe22

Anthem Breach: How Hackers Stole Credentials and Why Two-Factor Authentication May Help Prevent Future Phishing Scams

February 09, 2015 Added by:Thu Pham

If the Anthem attack was carried out as the result of using a single password, their access security wasn’t up to industry standards. Two-factor authentication may have thwarted attacks by requiring the use of a personal device to verify the identity of a system administrator or other technical employee with access to their database of millions of sensitive records.

Comments  (5)

60dcc0d0012f3056175c01d54c2e1722

Anthem Breach: 5 Preventive Steps to Protect Businesses Against Electronic Data Theft

February 05, 2015 Added by:Kevin Watson

This breach highlights that data security is not an issue limited to those processing credit cards. Businesses of all types must think of the type of information stored in their systems and realize they are only as secure as their weakest system.

Comments  (7)

Bd07d58f0d31d48d3764821d109bf165

The 60/40 Security Rule

February 05, 2015 Added by:Tripwire Inc

On any journey we take as we progress though life, occasions will arise when we arrive at a juncture where we recognize that somewhere way-back, we may have taken a wrong turn, which has brought us to a less than ideal place – an imposition which I believe we find ourselves in today with mitigating cyber crime and its associated threats.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Social Media Targeting: A Cautionary Tale

February 05, 2015 Added by:Brent Huston

The mission was simple, obtain either a file that listed more than 100 of their key suppliers, or obtain credentials and successfully logon to their internal supply system from an account that could obtain such a file.

Comments  (7)

Bd07d58f0d31d48d3764821d109bf165

Fighting Cyber Threats While Taking Human Behavior Into Consideration

February 04, 2015 Added by:Tripwire Inc

Security managers often find that what they put on paper is only half of the story. Getting the corporation to “cooperate” and follow the policy all the time can be far more challenging than it seems. So why do employees seem to be so reluctant?

Comments  (8)

Page « < 2 - 3 - 4 - 5 - 6 > »