Security Management

1b95dd6456ee7ab6df000bf89b4acdcc

STOP, Collaborate and Listen: Where Employee Vulnerabilities Put Data at Risk

September 07, 2016 Added by:Ron Arden

Whether it is the company’s trade secrets, product designs, financial data or the personal information of customers, businesses must protect high value information from landing in the hands of the wrong individual or threat group.

Comments  (0)

B8c37e33defde51cf91e1e03e51657da

Insider Threat: Why Negligence Is More Dangerous Than Malevolence

August 26, 2016 Added by:Eric Aarrestad

When addressing the risk of Insider Threats, we must look beyond those who are intentionally doing harm and place equal emphasis on those who are simply doing their job.

Comments  (0)

0133c663c244df033c2eeb2248dfee32

What Elements Are Needed for Security Analytics Success?

August 23, 2016 Added by:Mike Paquette

Not all security analytics solutions are created equal. There are five key characteristics critically important to ensuring that your security analytics are effective and capable of stopping today’s advanced threats.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

Hackers Ghosting the Trail

August 18, 2016 Added by:Michael Patterson

Attackers are going to get in and you will be required to perform incident response. The first thing the security team will ask for is the logs. Make sure logs are backed up to a 2nd system or 3rd system and make sure a UDP forwarder is relaying the messages.

Comments  (0)

459a952dc77e8d9757246964dee7fd18

Pragmatic Steps to Manage File Data Leakage Risks

August 18, 2016 Added by:Scott Gordon

Next generation F-DRM solutions offer an effective and flexible technical control that can be applied today to reduce file data leakage risks across different infrastructure, collaboration methods, user types and business requirements.

Comments  (0)

8e3215d0f18771cb3287f2123ffb2cdc

What the Auto Industry Can Learn from Payments Sector about Cybersecurity

August 17, 2016 Added by:Johannes Lintzen

An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Compliance Capabilities: Audit Achievement through Access Management

August 17, 2016 Added by:Dean Wiech

Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits.

Comments  (0)

22fcacf8b2a3c4d53529ef41c1df504a

Keep IT Safe: 5 Ways to Guard Against Olympic-Sized Streaming Threats

August 12, 2016 Added by:Peter Tsai

Big sporting events like the Olympic Games capture the hearts and attention of billions around the world. But how can companies avoid streaming agony and get high marks for network performance during live events? Here are tips straight from IT professionals.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Back to Basics: How Simple Techniques Can Thwart Complex APT Attacks

August 11, 2016 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – August 2016

August 11, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for August 2016. This patch update closes 30 vulnerabilities in SAP products including 26 SAP Security Patch Day Notes and 4 Support Package Notes.

Comments  (0)

D8cfa4fbaaebcf97800b91c2c7dedd5d

Getting Your Records GDPR-Ready

August 11, 2016 Added by:Gavin Siggers

The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.

Comments  (0)

Ad62dd51cf8a9e3d667bcdd92d493ccc

One Encryption Backdoor Is One Too Many

August 11, 2016 Added by:Joe Levy

Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.

Comments  (0)

D48cea157203015572756b2608f4c51f

Navigating the Complexities of Secure Third-Party Access

August 03, 2016 Added by:Mark Carrizosa

Three industry influencers identify trends and priorities and discuss what they are doing within their own organizations to mitigate third-party risk.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Brexit Means for Global Security Professionals

July 27, 2016 Added by:Dan Lohrmann

The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Security Is from Mars, Application Delivery Is from Venus

July 14, 2016 Added by:Nimmy Reichenberg

Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

A View from the Top: The C-Suite Steps Up as Cyber Security Threats Surge

July 13, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives—especially those not directly involved with deploying security programs—to fully participate and contribute on a continuous basis.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked