Database Security

F45df53d99605d46f5ae32b7bed9fe22

The Cost of a Data Breach in 2014: An Industry by Industry Breakdown

December 04, 2014 Added by:Thu Pham

The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (1)

Fb2ec53c17a3a96651244839dabd6ec8

Data Classification for a Stronger Security Outlook

November 26, 2014 Added by:Steve Martino

While data must be protected, not all data is of equal importance and therefore not in need of the same level of protection. Security teams should consider the types of data that exist within their organizations and what security measures will work best for each.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

7 Security Threats You May Have Overlooked

November 11, 2014 Added by:Patrick Oliver Graf

In today’s business environment, the list of overlooked network security threats is endless. Information security professionals are modern-day gladiators, tasked with defending corporate data and networks against both known and unknown threats, but no matter how skilled they are, there will always be new threats to their networks.

Comments  (1)

D36d0936f0c839be7bf2b20d59eaa76d

Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Accepting Identity Theft

October 06, 2014 Added by:Brent Huston

I can recall a time when I wasn’t concerned about data theft. Eventually, buzz words such as “breach” and “identity theft” became a regular part of my vocabulary.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

93c815429fc1ab15a9295a4f55989ae0

Cached Domain Credentials in Vista/7 (AKA Why Full Drive Encryption is Important)

July 17, 2014 Added by:Neohapsis

Without full disk encryption (like BitLocker), sensitive system files will always be available to an attacker, and credentials can be compromised.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Hacks of Houston Astros, Butler University Put Network Security on Center Stage

July 14, 2014 Added by:Patrick Oliver Graf

Together, the high-profile hacking of the Houston Astros and Butler University show why it’s important for every organization to think like an enterprise in constructing a network security plan.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Big Data's Big Promise Isn't Here Yet

June 24, 2014 Added by:Tripwire Inc

What is interesting to me is how much hope people have for big data being the savior of the security world. I don’t believe that’s going to happen anytime soon.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Adventures in Finding Cardholder Data

May 21, 2014 Added by:PCI Guru

In the past, organizations would rely on their database and file schemas along with their data flow diagrams and the project was done. However, the Council has come back and clarified that the search for cardholder data (CHD), primarily the primary account number (PAN).

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Insider Threat: Does It Matter Now? And How Much?

May 08, 2014 Added by:Anton Chuvakin

While everybody is reading the DBIR 2014, I wanted to re-read it with a particular lens – that on the insider threat.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Verizon 2014 DBIR: Hide Your Servers and Call the Cops

April 23, 2014 Added by:Tripwire Inc

Know what you have, know how it’s vulnerable, configure it securely, and continuously monitor it to ensure it isn’t compromised and remains secure.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)

65c1700fde3e9a94cc060a7e3777287c

Zero Trust and the Age of Global Connectivity

February 27, 2014 Added by:Simon Moffatt

The internal 'trusted' network no longer exists. Employees often pose the biggest threat to information assets, even though they are trusted with legitimate accounts on protected internal machines. Zero Trust is a recent security approach that looks to move away from network segmentation and focus more on data and resources and who can access them, when and from where.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Stopping Remote Access Breaches with “Honey”

February 07, 2014 Added by:Patrick Oliver Graf

A new approach, called “Honey Encryption”, could potentially offer more effective digital security by making fake data appear to be legitimate and valuable information to hackers.

Comments  (6)

Page « < 1 - 2 - 3 - 4 - 5 > »