Security Management

Ebb72d4bfba370aecb29bc7519c9dac2

Security Analytics – Finally Emerging For Real?

January 13, 2015 Added by:Anton Chuvakin

Security analytics – a topic as exciting and as fuzzy as ever!

Comments  (1)

93c815429fc1ab15a9295a4f55989ae0

Operational Security - Home Rules

January 12, 2015 Added by:Neohapsis

What we tell those we advise in business also applies to friends and family; the time you spend preparing now may save you countless hours of worry and expense down the road.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Young IT Professionals, Cybercrime, Script Kiddies & CyberWarriors, OH MY!

January 12, 2015 Added by:Brent Huston

Recently I came across a couple of articles that both centered on the potential roles that young people entering into the IT Security field may face.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Should Companies Strike Back at Hackers?

January 08, 2015 Added by:Tripwire Inc

The question of whether it makes sense to attack your cyber attackers isn’t new—this has been a debate in the infosec community for quite a while. In my opinion, in most cases the answer is “No, companies shouldn’t attack back.”

Comments  (5)

E595c1d49bf4a26f8e14ce59812af80e

Ex-Employees: All the Best, But Can We Have Our Personal Emails Back, Please?

January 07, 2015 Added by:Patrick Oliver Graf

It doesn’t matter if employees leave a company on unpleasant terms or quite amicably – it is absolutely essential that enterprises have solid, well-defined termination processes in place, and that they’re followed to the letter.

Comments  (3)

6ee5846e0a227db0333ff7c99ff61313

When You Are Overwhelmed With Alerts, it is Time to Automate.

January 07, 2015 Added by:Michael Leland

Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.

Comments  (1)

F45df53d99605d46f5ae32b7bed9fe22

Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (5)

6a71825dbf6d876764b845e0fd664e0b

Moving from Alert-Driven to Intelligence-Driven Security

January 05, 2015 Added by:Paul Lipman

The emergence of smart, integrated, cloud-based security services will enable a transformation from an alert-centric to an intelligence-centric approach to security. This will vastly enhance the Chief Information Security Officer's (CISO’s) visibility and ultimately deliver substantial improvements in the robustness of the overall security posture.

Comments  (1)

Ab28a67c637101abd994329b9bf494e8

Eat. Pray. Love. – Three Words that Comply with Sony’s Password Policy

January 01, 2015 Added by:Scott Garber

While evaluating the Sony hack and explosion of related press, our team discovered an eerie tie-in to the titles and taglines in Sony Pictures massive movie library, which might have been an early indicator of the inevitable breach.

Comments  (1)

0ead717779244d9aab5c1699308850d2

JPMorgan Hackers Compromised Server Unprotected by Two-factor Authentication

December 24, 2014 Added by:Brian Prince

A server that lacked two-factor authentication was the gateway hackers used to breach JPMorgan Chase this year, according to a report.

Comments  (3)

65be44ae7088566069cc3bef454174a7

Improve Information Security and Privacy Now!

December 22, 2014 Added by:Rebecca Herold

Too many businesses have poor information security controls in place (e.g,. demonstrably Sony, Staples, and a seemingly infinite number of other companies) and are basically giving their intellectual property, and the personal information they are responsible for, away.

Comments  (3)

Ebb72d4bfba370aecb29bc7519c9dac2

Should I Use “SIEM X” or “MSSP Y”?

December 18, 2014 Added by:Anton Chuvakin

Lately I’ve been surprised by some organizational decision-making as they think about their sourcing choices for security monitoring.

Comments  (1)

65be44ae7088566069cc3bef454174a7

5 Effective Ways to Raise Privacy Awareness

December 18, 2014 Added by:Rebecca Herold

Here are five of the ways that I’ve found to be very effective for raising privacy awareness throughout the years.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

What Network Security Lessons Can We Learn from the Sony Attack?

December 17, 2014 Added by:Patrick Oliver Graf

Hollywood is a place that can be driven mad by star-studded gossip, where the talk of the town is rarely private and where people are accustomed to their secrets not staying secret for very long. Yet, this state of play hasn’t made it any easier for the victims of last month's cyberattack against Sony, carried out by shadowy assailants calling themselves the Guardians of Peace.

Comments  (15)

Bd07d58f0d31d48d3764821d109bf165

Debunking The Biggest Cyber Security Myths for Businesses

December 16, 2014 Added by:Tripwire Inc

A glimpse at the world of cyber security can be a frightening one. Stories revolving around security breaches hitting major companies, like Target and Home Depot, can fill any business executive with trepidation.

Comments  (6)

Ebb72d4bfba370aecb29bc7519c9dac2

How To Exit an MSSP Relationship?

December 15, 2014 Added by:Anton Chuvakin

Let me touch a painful question: when to leave your managed security services provider?

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »