Security Management

E3703200c88cf14d197d51bf79104675

Planning for the Unknown: 2 Key Steps to Prepare for Cyber Threats

February 11, 2015 Added by:Arabella Hallawell

Do businesses have incident response plans in place, and if so, what are some of the best practices that CSOs should implement as part of their security response plans?

Comments  (6)

B8db824b8b275afb1f4160f03cd3f733

We Need to Talk About Attribution

February 11, 2015 Added by:Jack Daniel

One of the InfoSec community’s greatest distractions lately has been attribution, both specifically and generically.

Comments  (5)

E595c1d49bf4a26f8e14ce59812af80e

Europe: More than Just ‘Stumbling Forward’ to Improved Cybersecurity

February 11, 2015 Added by:Patrick Oliver Graf

Two years ago almost to the day, months before cyberattacks entered the world’s collective consciousness, the European Union took the bold step of publishing an ambitious cybersecurity strategy. The strategy aims to outline the best path forward for identifying and responding to emerging digital threats.

Comments  (10)

B689dd1362bef7eb372a540d3b6e6287

Humanizing Non-Human High Privileged Accounts

February 10, 2015 Added by:Identropy

Every IT environment has them. They are called by a variety of names: Non-human accounts; system accounts; service accounts; administrator accounts; shared accounts; group accounts; and the list goes on. What is common is that they have exceedingly high privileges to often the most critical areas of an IT environment.

Comments  (7)

507c8b7b935d89fb00bab0609b37de42

Poor SIEM – Why Do We Doom You to Fail?

February 10, 2015 Added by:Robert Eslinger

Some say the current SIEM status quo provides no value and must evolve if it’s to survive. But I believe these views stem from a fundamental misunderstanding of what SIEM does (or should do).

Comments  (5)

F45df53d99605d46f5ae32b7bed9fe22

Anthem Breach: How Hackers Stole Credentials and Why Two-Factor Authentication May Help Prevent Future Phishing Scams

February 09, 2015 Added by:Thu Pham

If the Anthem attack was carried out as the result of using a single password, their access security wasn’t up to industry standards. Two-factor authentication may have thwarted attacks by requiring the use of a personal device to verify the identity of a system administrator or other technical employee with access to their database of millions of sensitive records.

Comments  (5)

60dcc0d0012f3056175c01d54c2e1722

Anthem Breach: 5 Preventive Steps to Protect Businesses Against Electronic Data Theft

February 05, 2015 Added by:Kevin Watson

This breach highlights that data security is not an issue limited to those processing credit cards. Businesses of all types must think of the type of information stored in their systems and realize they are only as secure as their weakest system.

Comments  (7)

Bd07d58f0d31d48d3764821d109bf165

The 60/40 Security Rule

February 05, 2015 Added by:Tripwire Inc

On any journey we take as we progress though life, occasions will arise when we arrive at a juncture where we recognize that somewhere way-back, we may have taken a wrong turn, which has brought us to a less than ideal place – an imposition which I believe we find ourselves in today with mitigating cyber crime and its associated threats.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Social Media Targeting: A Cautionary Tale

February 05, 2015 Added by:Brent Huston

The mission was simple, obtain either a file that listed more than 100 of their key suppliers, or obtain credentials and successfully logon to their internal supply system from an account that could obtain such a file.

Comments  (7)

Bd07d58f0d31d48d3764821d109bf165

Fighting Cyber Threats While Taking Human Behavior Into Consideration

February 04, 2015 Added by:Tripwire Inc

Security managers often find that what they put on paper is only half of the story. Getting the corporation to “cooperate” and follow the policy all the time can be far more challenging than it seems. So why do employees seem to be so reluctant?

Comments  (8)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Analytics: Projects vs Boxes (Build vs Buy)?

February 04, 2015 Added by:Anton Chuvakin

So, it may seem that there is now a BUILD vs BUY choice…but is there?!

Comments  (6)

Af7244bb99debb4a1152fa49a993a05c

Security Seen as Top Obstacle to Success in Application Economy: Report

February 03, 2015 Added by:Eduard Kovacs

A survey conducted by Vanson Bourne on behalf of CA Technologies shows that senior IT and business leaders from across the world consider security a top obstacle to becoming more effective in the application economy.

Comments  (6)

0ead717779244d9aab5c1699308850d2

Getting Employee Security Awareness Training Right

February 03, 2015 Added by:Brian Prince

Training employees right, experts said, takes a mix of clearly-defined goals, executive support and an understanding of employees' roles and the target audience.

Comments  (5)

A70a600d7c593ca50cc6639cd64ed71a

Attackers, Distraction, Deception and Misdirection

February 03, 2015 Added by:Joseph Pizzo

When it comes to security, be it data in motion, data in execution or data at rest, the bad guys often lurk in plain sight. They have the time and patience to wait for a distraction that allows their malicious activity to go by unseen.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

The Need for an Incident Recovery Policy (IRP)

February 02, 2015 Added by:Brent Huston

Given the recent spate of breaches and compromises that we have analyzed and been involved in over the last year, we have seen an emerging need for organizations to now embrace a new kind of policy – a security incident RECOVERY policy.

Comments  (4)

3caea4d9bcdd5cde2b1a1f338a06a086

Digital Reputation: Can’t Buy it, Gotta Earn It

January 29, 2015 Added by:Jonathan Curtis

Can’t buy it, gotta earn it, as the old saying goes. With a few short searches, it is easy to find tweets that have had a significant impact on the reputation of institutions, police departments, online ecommerce properties, and corporations in 2014.

Comments  (9)

Page « < 2 - 3 - 4 - 5 - 6 > »