Security Training

Ebb72d4bfba370aecb29bc7519c9dac2

Security Essentials? Basics? Fundamentals? Bare Minimum?

June 25, 2014 Added by:Anton Chuvakin

Let’s think together – what technologies and practices constitute information security essentials?

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

What’s the Best Tool for the Job?

June 24, 2014 Added by:Jack Daniel

I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses. That reminded me of a lesson about tools I learned many years ago.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Tips for BYOD

June 18, 2014 Added by:Brent Huston

While much has been said about products and services that are emerging around this space, I wanted to tack back to 3 quick basics that can really help, especially in small and mid-size organizations.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Prank URL Shortening Service is Good Security Basics Reminder

June 18, 2014 Added by:Malwarebytes

Of course, it pays to be vigilant when presented with a shortening service link. While it’s a useful tool to have, there have always been issues with regards to your possible final destination.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

An Ounce of Big Data is Worth a Pound of Defense

June 17, 2014 Added by:Ali Golshan

In security circles, the concept of what constitutes prevention has shifted from as recently as five years ago, due to the growth in complexity of malware and growing maturity and sophistication of cybercriminals.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Global Response to Snowden Disclosures Revealed in New Report

June 12, 2014 Added by:Electronic Frontier Foundation

It has been one year since the first Snowden disclosure and in lieu of this first anniversary, world privacy expert and publisher of The Privacy Surgeon, Simon Davies, conceived and published a report titled “A Crisis of Accountability: A global analysis of the impact of the Snowden revelations.”

Comments  (10)

E595c1d49bf4a26f8e14ce59812af80e

Will Network Security Concerns Sink Government BYOD?

June 11, 2014 Added by:Patrick Oliver Graf

Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security: It's Us vs. Them - Or is it?

June 10, 2014 Added by:Tripwire Inc

The fact is most reported breaches are not caused by elegant external attacks. They are caused by careless employees who click the link before they think, despite our best efforts to make them aware of risks and train them in security basics.

Comments  (1)

F5b1211c3952ce30f829cd3c757a1a7f

Was Steve Jobs Wrong About Product Design?

June 10, 2014 Added by:Ali Golshan

It is not a question of if we should listen to customers, rather what we should or must listen to customers for, and how we listen.

Comments  (1)

93c815429fc1ab15a9295a4f55989ae0

Signatures of PINS? EMV is Coming

June 09, 2014 Added by:Neohapsis

Ultimately, whether cards are authenticated via PIN or signature, the chip-based credit cards being rolled out in the U.S. will rely upon EMV security measures to protect the security of credit card data.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

BYOD and Its Risks to Network Security

June 05, 2014 Added by:Patrick Oliver Graf

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Why the Bridge Still Needs to be Built Between Operations and IT

June 04, 2014 Added by:Joe Weiss

When people complain that operators are too focused on safety and reliability I don’t know whether to laugh or cry.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

U.S. Agencies Need to Improve Cyber Incident Response Practices

June 04, 2014 Added by:Stefano Mele

The U.S. Government Accountability Office (GAO) found that twenty-four major federal agencies did not consistently demonstrate that they are effectively responding to cyber incidents (a security breach of a computerized system and information).

Comments  (0)

65be44ae7088566069cc3bef454174a7

Privacy Lessons from Snapchat

June 03, 2014 Added by:Rebecca Herold

Oh, you’ve not heard yet? Or, you heard something about Snapchat but thought it was all about teens taking risqué photos that were then captured by screen shots?

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Want Some More Bad News?

June 02, 2014 Added by:Wendy Nather

If so much of security relies on a contest of knowledge, then it's no wonder that so much of what we build turns into wet Kleenex at the drop of a (black) hat.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Effectively Communicating Attack Surface Analytics

June 02, 2014 Added by:Tripwire Inc

Executive leadership (including the board member) is not typically interested in operational security details such as answers to questions about specific security control metrics. This information is too detailed and will be viewed as “noise” by those outside the IT and security teams.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »