Security Management

Af2c9843333cc1e2578ddf18b3eed066

The Sony Breach Shows that Security Needs to be a Boardroom Topic

May 07, 2015 Added by:Peter Zavlaris

The world has plunged headfirst into the Internet revolution without taking into account the repercussions technological repercussions.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Why You Need a Disciplined Response to Digital Forensics

May 07, 2015 Added by:Tripwire Inc

With acceptance that the prospect of unauthorised incursion, hacks and/or compromise of corporate, and personal systems is to now be expected, it would seem to make good sense to accommodate mechanisms with which the organisation may respond to such manifestation as and when they are encountered.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Embracing Cyber Resilience in Today's Cyber-Enabled World

May 06, 2015 Added by:Steve Durbin

Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Zero-Days Remained Unpatched an Average of 59 Days

May 05, 2015 Added by:Anthony M. Freed

The newly released Internet Security Threat Report (ISTR) – which examines emerging trends in attacks, malicious code activity, phishing, and spam – reveals that 2014 was a record-setting year for the exploitation of zero-day vulnerabilities, and it took software companies an average of 59 days to implement patches, up from only four days in 2013.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Inside IaaS Security Challenges for Enterprises

May 05, 2015 Added by:Brian Prince

Infrastructure-as-a-service can provide an attractive option for businesses, but approaching security wrong can come with a cost all its own.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Top Critical Skill In Information Security: Be Humble

May 04, 2015 Added by:Tripwire Inc

Being involved in information security is intimidating. Not just because you are dealing with complex technology with serious implications if you fail, but everyone around you is going to be smarter than you. Even your adversaries. Especially your adversaries. Get used to it.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

RSA 2015: Rise of Chaos!!

May 04, 2015 Added by:Anton Chuvakin

Here is my traditional RSA (#RSAC) reflection post for RSA 2015 Conference – all my personal opinions/impressions/thoughts, of course.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Social Engineering: Attackers' Reliable Weapon

April 29, 2015 Added by:Brian Prince

Whatever the ploy, social engineering is the opening salvo in targeted attacks against organizations all over the world.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

RSA Wrap-Up: There's a Dark Cloud Looming Over Information Security

April 28, 2015 Added by:Peter Zavlaris

The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

How to Resolve the BYOD Stand-Off Between Employees and IT

April 28, 2015 Added by:Patrick Oliver Graf

Users want, and demand, access to a broad range of personal mobile devices in the workplace. They want to be able to safely access work files on their phones while on-the-go and work from their homes on their personal laptops.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

How to Use Risk Assessment to Secure Your Own Home

April 27, 2015 Added by:Brent Huston

Risk assessment and treatment is something we all do, consciously or unconsciously, every day.

Comments  (0)

Default-avatar

Four Steps to An Effective Privacy Program

April 27, 2015 Added by:Angela Matney

Privacy is not just a concern for large, multinational corporations. Today, businesses of all sizes collect and store more personal data than ever before.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

The Changing Role of the CISO

April 21, 2015 Added by:Peter Zavlaris

The number of security breaches that have occurred over the last year and a half is unprecedented and has demonstrated a requirement for stronger security. The improvements needed to be made from within will stem from the CISO’s desk. This represents a shift that will require enterprises to re-examine the role of the CISO.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Three Things That Need Spring Cleaning in InfoSec

April 19, 2015 Added by:Brent Huston

Spring is here in the US, and that brings with it the need to do some spring cleaning. So, here are some ideas of some things I would like to see the infosec community clean out with the fresh spring air!

Comments  (0)

0ead717779244d9aab5c1699308850d2

Healthcare Industry Challenged by Data Breaches, Compliance

April 15, 2015 Added by:Brian Prince

In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »