Database Security
The Age of Advanced Threats Has Arrived
January 15, 2016 Added by:Luis Corrons
The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.
Comments (0)
What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?
December 21, 2015 Added by:Dan Lohrmann
Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...
Comments (0)
Cybersecurity Predictions for 2016
December 16, 2015 Added by:Tim Liu
2015 was another fascinating year for cybersecurity. From the OPM to Anthem, Ashley Madison and countless other data breaches, there was no shortage of stories capturing national attention. So what does 2016 have in store?
Comments (0)
Why Companies Fail to Secure Their Web Apps
December 14, 2015 Added by:Ilia Kolochenko
The five things that companies do to make hacking into their websites and web applications even easier for the hackers.
Comments (0)
Managing Security Resources: It’s All About People and Awareness (Part II)
December 07, 2015 Added by:Steve Durbin
As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.
Comments (0)
Organizations Must Wake Up To Hidden Security Vulnerabilities
December 03, 2015 Added by:Darren McCue
Time and again we see companies neglecting to protect themselves at the most basic, key levels – on both the physical and digital sides – leaving dangerous gaps in coverage to be exploited farther down the complexity chain.
Comments (0)
Managing Security Resources: It’s All About People and Awareness (Part I)
December 01, 2015 Added by:Steve Durbin
Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.
Comments (0)
Hackers and Threats: Cybercrime Syndicates Go Global
August 04, 2015 Added by:Steve Durbin
Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...
Comments (0)
Cloud Security: It’s in the Cloud - But Where? (Part II)
June 22, 2015 Added by:Steve Durbin
Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.
Comments (0)
OPM Breach: Where is the Data Going?
June 16, 2015 Added by:Peter Zavlaris
The OPM breach has drawn national attention and rightfully so. However, at first blush the attack seems typical of a particular threat actor that continues to successfully breach large organizations and steal PII.
Comments (0)
UK Data Breaches Have Increased in Number, Scale and Cost, Reveals Study
June 11, 2015 Added by:Tripwire Inc
According to the 2015 Information Security Breaches Survey, the number of security breaches has increased in the past year, whereas the scale and cost have nearly doubled.
Comments (0)
What is PHI?
June 03, 2015 Added by:Danny Lieberman
Software Associates specialize in HIPAA security and compliance for Israeli medical device companies – and 2 questions always come up: “What is PHI?” and “What is electronically protected health information?”
Comments (0)
Highlights From Verizon Data Breach Report 2015
May 19, 2015 Added by:Anton Chuvakin
Credential abuse still reign supreme.
Comments (0)
Whole Disk Encryption Explained
May 18, 2015 Added by:PCI Guru
There are a lot of security professionals and lay people that seem to believe that encryption is encryption and that is simply not the case.
Comments (0)
2015 Verizon DBIR and the Human Attack Surface
April 16, 2015 Added by:Tripwire Inc
Verizon’s annual Data Breach Investigations Report (DBIR) gives annual analysis and insight to the prior year’s security incidents and confirmed data breaches. As a security practitioner, I look to this report as a bellwether for our own security practices – what patterns are emerging and what should be my immediate takeaways to better protect my organization.
Comments (0)
Dangers Accelerate: Increasing Global Threats Loom Over Information Security Landscape
March 19, 2015 Added by:Steve Durbin
The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.
Comments (0)
- SAP Cyber Threat Intelligence Report – April 2018
- Cloud Security Alert – Log Files Are Not the Answer
- Avoiding Holes in Your AWS Buckets
- The Three Great Threats to Modern Civilization
- 2020 Vision: How to Prepare for the Future of Information Security Threats
- Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus
- Unconventional Thinking — Four Practices to Help Mitigate Risk
- The Night the Lights Went out in Georgia (Almost)
- Is Blockchain Really Disruptive in Terms of Data Security?
- Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed