Security Management

Ebb72d4bfba370aecb29bc7519c9dac2

RSA 2015: Rise of Chaos!!

May 04, 2015 Added by:Anton Chuvakin

Here is my traditional RSA (#RSAC) reflection post for RSA 2015 Conference – all my personal opinions/impressions/thoughts, of course.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Social Engineering: Attackers' Reliable Weapon

April 29, 2015 Added by:Brian Prince

Whatever the ploy, social engineering is the opening salvo in targeted attacks against organizations all over the world.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

RSA Wrap-Up: There's a Dark Cloud Looming Over Information Security

April 28, 2015 Added by:Peter Zavlaris

The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

How to Resolve the BYOD Stand-Off Between Employees and IT

April 28, 2015 Added by:Patrick Oliver Graf

Users want, and demand, access to a broad range of personal mobile devices in the workplace. They want to be able to safely access work files on their phones while on-the-go and work from their homes on their personal laptops.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

How to Use Risk Assessment to Secure Your Own Home

April 27, 2015 Added by:Brent Huston

Risk assessment and treatment is something we all do, consciously or unconsciously, every day.

Comments  (0)

Default-avatar

Four Steps to An Effective Privacy Program

April 27, 2015 Added by:Angela Matney

Privacy is not just a concern for large, multinational corporations. Today, businesses of all sizes collect and store more personal data than ever before.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

The Changing Role of the CISO

April 21, 2015 Added by:Peter Zavlaris

The number of security breaches that have occurred over the last year and a half is unprecedented and has demonstrated a requirement for stronger security. The improvements needed to be made from within will stem from the CISO’s desk. This represents a shift that will require enterprises to re-examine the role of the CISO.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Three Things That Need Spring Cleaning in InfoSec

April 19, 2015 Added by:Brent Huston

Spring is here in the US, and that brings with it the need to do some spring cleaning. So, here are some ideas of some things I would like to see the infosec community clean out with the fresh spring air!

Comments  (0)

0ead717779244d9aab5c1699308850d2

Healthcare Industry Challenged by Data Breaches, Compliance

April 15, 2015 Added by:Brian Prince

In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.

Comments  (0)

6d117b57d55f63febe392e40a478011f

FFIEC Issues Guidance on Destructive Malware Attacks

April 14, 2015 Added by:Anthony M. Freed

The Federal Financial Institutions Examination Council (FFIEC) released two documents with guidance for financial institutions on mitigating risks from the increase in cyber attacks that compromise user credentials or employ destructive software.

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

The CISO Role in Cybersecurity: Solo or Team Sport?

April 14, 2015 Added by:Kevin L. Jackson

The best skill set for preparing someone to become a CISO is a statistical tie between business knowledge and knowledge of IT security best practices.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

10 Steps to Improve Your Layered Defense Strategy

April 13, 2015 Added by:Tripwire Inc

We have a problem in the security community – or maybe within the modern information age of humanity in general. That problem is we see security as a technology, policy, privacy or people issue, instead of an integrated combination thereof.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

IT Security? “Yes Please,” says Uncle Sam – But Offers No Tangible Help

April 13, 2015 Added by:Patrick Oliver Graf

When it comes to IT security, government agencies around the world are aware of the challenges and risks small and medium-sized enterprises (SMEs) face. So it only figures that they offer help, in the form of initiatives aimed specifically at SMEs.

Comments  (0)

306708aaf995cf6a77d3083885b60907

FireEye Reveals APT30: A Decade-Long Cyber Espionage Campaign Targeting South East Asia

April 12, 2015 Added by:Mike Lennon

FireEye on Sunday uncovered details of a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

Cybersecurity Trends for SMBs: Mobile, Security and the Cloud

April 10, 2015 Added by:Paul Lipman

While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Is Offensive Security the Future?

April 08, 2015 Added by:Tripwire Inc

If we are still of the opinion that standardized security, policies and other soft mechanisms will accommodate the robust levels of security we are seeking – sorry to report, but they will not.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »