Policy

0e4d50f3874398fa86bb0633f1cd7ee4

Calming the Complexity: Bringing Order to Your Network 

October 20, 2017 Added by:Reuven Harrison

With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

#NCSAM: Third-Party Risk Management is Everyone’s Business

October 17, 2017 Added by:Scott Schneider

This post explores one of the weekly themes for National Cyber Security Awareness Month, “Cybersecurity in the Workplace is Everyone’s Business.”

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Why Cloud Security Is a Shared Responsibility

October 13, 2017 Added by:Sanjay Kalra

If you’re about to join the cloud revolution, start by answering these questions: how are security responsibilities shared between clients and cloud vendors? And why do on-premises security solutions fail in the cloud?

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security Awareness: Watch-Out for Hurricane Harvey Online Scams

August 28, 2017 Added by:Dan Lohrmann

As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

Is Your Data at Risk Due to Third-Party Cloud Applications?

August 02, 2017 Added by:Scott Schneider

A simple mistake in one security setting can jeopardize the personal information of your customers. The costs of such carelessness are regulatory fines, a damaged reputation and a possible lawsuit.

Comments  (0)

E3fc80dfc564927d51a4d7320b45d6fa

Survey Shows Employers under Pressure to Keep Mobile Workers Safe

June 30, 2017 Added by:Vincent Geffray

According to a new report from Everbridge, 77% of employers said their employees would prioritize safety over privacy concerns when it comes to identifying their location during a critical event.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Lax IIoT Cybersecurity: the Perfect Breeding Environment for Industroyer

June 29, 2017 Added by:Jalal Bouhdada

In meeting the challenge posed by greater levels of threats and fewer cybersecurity specialists to meet them, a shift in focus is essential.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Don’t get lost in translation when managing mixed firewall estates

June 27, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO at AlgoSec, looks at how organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Social Security Administration’s Second Attempt at 2FA Fails Federal Government’s Own Standards, Not Secure

June 06, 2017 Added by:Alexandre Cagnoni

The Social Security Administration (SSA) recently instituted its latest precautions to identify threats and protect citizens’ information by making two-factor authentication mandatory for all users.

Comments  (0)

4d0ac884f6fdb0c44f281653697aa2cc

The Administrative Credentials Security Hole

May 24, 2017 Added by:Chris Stoneff

Here’s the problem: the existence of administrative credentials stored on machines throughout the network.

Comments  (0)

5ad5c9808e863169a36cd3b7c535d72b

Convenience vs. Control: Achieving the Right Security Balance

May 12, 2017 Added by:Kevin Cunningham

By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.

Comments  (0)

21a45a9d0545830392fdf2b51c4d8c54

GDPR: Ignore It at Your Own Risk

May 09, 2017 Added by:Tomáš Honzák

The GDPR will change business as we know it, and the best we can do is make sure we’re prepared.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

May 09, 2017 Added by:Scott Schneider

Bad guys will continue to prey upon the path of least resistance - third parties. It’s up to you to ensure your organization takes a comprehensive and risk based approach - rather than focusing solely on compliance.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

Are Job Seekers at Risk of a Cyber Breach?

April 07, 2017 Added by:Amir Geri

Job seekers are regularly expected to input personal information about themselves to company and state databases, but it should be guaranteed that their information will remain secure.

Comments  (0)

D39e8a0d81c2a146f879631550fb065b

GRC: Going Beyond the Acronym

March 10, 2017 Added by:Corey Wilburn

An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »