Security Management

5dbdfb006bfb96cb7115ce3a5a985171

Online Self-Policing: Check Yourself Before You Wreck Yourself

June 11, 2015 Added by:Lisa Huff

As we post to Facebook and Twitter, and share pictures via Instagram or Pinterest, we don’t stop to think about how our posts or pictures could come back to haunt us later in life.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Prioritizing Patch Management Critical to Security

June 09, 2015 Added by:Brian Prince

Recent stats from the Verizon Data Breach report showed that many of the most exploited vulnerabilities in 2014 were nearly a decade old, and some were even more ancient than that.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

IT Security: Evolving to a Risk-Based Approach

June 09, 2015 Added by:Tripwire Inc

For those involved with securing privileged information, the news of the latest big breach plastered on every TV, website and newspaper commonly elicits a pair of simultaneous reactions: relief that it’s not your organization and dread that it could be the next time.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Change Controls Are Still Necessary

June 08, 2015 Added by:Rebecca Herold

Over the years in the security classes I’ve taught, I’ve covered the importance of program change control management, and I wanted to continue the discussion here because as important as it is, it typically does not get the attention it deserves in most organizations.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Trust-Based Security Models Ineffective: Researchers

June 04, 2015 Added by:Eduard Kovacs

The trust-based foundations of whitelisting make it more difficult for organizations to properly protect their networks against cyber threats, Kaspersky Lab researchers have warned.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Concerns over Brand Security are Escalating

June 03, 2015 Added by:Peter Zavlaris

The unprecedented technological advancement seen over the last two decades has become a double-edged sword. As a result, information security has gone from being a tertiary IT function to a significant operational risk.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Two's (Or More) Company: How to Use Two-Factor Authentication the Right Way

June 03, 2015 Added by:Patrick Oliver Graf

These days, you need a password to access every aspect of your digital life, and we all know how problematic that can be.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Zero-Day Export Regulation Proposal Released for Public Comment

June 01, 2015 Added by:Anthony M. Freed

The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has released the proposal for regulatory control of the export of malware and zero-day exploits for a sixty-day public comment period, and the reaction from the security community and other interested parties is already definitively negative.

Comments  (0)

99f59c0842e83c808dd1813b48a37c6a

Take Control of the Unsupervised BYOD Party

May 28, 2015 Added by:Michael Kienzle

Is your company’s BYOD (Bring Your Own Device) policy leaving your IT team feeling a bit uneasy? If so, perhaps it’s time for a CYOD or Choose Your Own Device policy.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

New Global Initiative Aims at Securing Smart Cities

May 28, 2015 Added by:Eduard Kovacs

Security researchers, companies and organizations have joined forces in a new non-profit global initiative whose goal is to secure smart cities.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Threat Intelligence Sharing Valued, But Many Not Doing it: Survey

May 27, 2015 Added by:Brian Prince

Enterprises may largely agree that threat intelligence is important, but few are doing any actual sharing themselves, according to a new survey.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Sign of the Times: Verizon Breach Report Tracks New Category

May 27, 2015 Added by:Peter Zavlaris

This year’s Verizon Data Breach Investigations Report (VDBIR) added a new category to its VERIS (Vocabulary for Event Recording and Incident Sharing) to track attacks with “secondary” motives.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Outsourcing Remote Access Management Isn't The Answer For SMBs

May 27, 2015 Added by:Patrick Oliver Graf

So, should network administrators consider tapping into MSPs for network security in our current environment? The core issue is a common one in network security – convenience vs. security.

Comments  (0)

5dbdfb006bfb96cb7115ce3a5a985171

Threat Intelligence: Knowledge is Power

May 26, 2015 Added by:Lisa Huff

Organizations have made massive investment in a variety of security solutions over the years. It is important to understand what investments that have made in security technologies in order to understand the success and possible challenges that they face.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

SSL and TLS Update

May 26, 2015 Added by:PCI Guru

The answer to SSL and TLS vulnerabilities are to remediate as soon as possible. If you are unable to remediate, then you need to mitigate the risk until you can remediate.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Cloud Security Monitoring … Revisited (aka It Is Not 2012 Anymore!)

May 26, 2015 Added by:Anton Chuvakin

My next project, now that I am done with security analytics for now, is to revisit our cloud security monitoring work.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »