Security Management

B689dd1362bef7eb372a540d3b6e6287

Tomorrow’s Forecast: Increasing Clouds. Extending Your Secure Identity Environment into the Cloud

April 07, 2015 Added by:Identropy

As more company business units explore and adopt Software as a Service (SaaS) solutions for their technology needs, IT security groups struggle to keep the “gathering clouds” from raining on their secured environment. On the bright side, these organizations have a very strong security foundation in place for internally hosted applications.

Comments  (0)

6d117b57d55f63febe392e40a478011f

One-in-Six Advocate Prison for CEOs and Board Members After Breaches

April 06, 2015 Added by:Anthony M. Freed

In a recent survey of security professionals conducted at the e-Crime Congress, 16% of respondents said they support laws that would result prison sentences for executives and Boards of Directors for any negligence on their part following a major data breach.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Cybercrime Is Now More Profitable Than The Drug Trade

April 06, 2015 Added by:Tripwire Inc

As reported by the 2013 Europol Serious & Organized Threat Assessment, the “Total Global Impact of CyberCrime [has risen to] US $3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.”

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Issues Penetration Testing Information Supplement

April 06, 2015 Added by:PCI Guru

Not surprisingly, I have a number of comments based on what I have read. There are some good things that have come out of this effort. But in my opinion, the committee missed the boat in a few areas and those will lead to even more confusion between penetration testers, QSAs and clients.

Comments  (0)

8f7b2d9100577f77aa8fbb4f51c0366e

Rethinking the Cyber Kill Chain

April 02, 2015 Added by:Invincea

While the underlying framework and conclusions are excellent, there are few entities capable of fully implementing defenses against all aspects of the cyber kill chain for multiple reasons

Comments  (0)

0ead717779244d9aab5c1699308850d2

30 Percent of Companies Would Negotiate Data Ransom With Cybercriminals

April 01, 2015 Added by:Brian Prince

Negotiating with criminals is risky, but it is apparently a risk some people are willing to take if it is going to get them their data back.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Enterprise Security Pros Embracing Threat Intelligence, But Question Reliability: Survey

March 31, 2015 Added by:Brian Prince

While 53 percent said threat intelligence was critical to having a strong security posture, 47 percent did not agree.

Comments  (0)

6d117b57d55f63febe392e40a478011f

NIST: Internet of Things Hampered by Lack of Effective Timing Signals

March 31, 2015 Added by:Anthony M. Freed

As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Are You Prepared for Runaway Deprovisioning in Your IAM Environment? A True-Life Story…

March 31, 2015 Added by:Identropy

Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Should Infosec Professionals Hack To Understand the Mind of the Attacker?

March 31, 2015 Added by:Tripwire Inc

To anticipate where and how an attacker might strike next, security professionals are realizing the importance of being able to understand the mind of the attacker and what they value in a target.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Things I Learned Talking to InfoSec People About Crime

March 30, 2015 Added by:Brent Huston

There is a complete disconnect between the way most bad guys think and operate and the way many infosec folks think and operate.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

How to Manage Mac and Mobile Devices in Your Existing Infrastructure

March 30, 2015 Added by:InfosecIsland News

Please join us on Tuesday, March 31 at 1PM ET for a special webcast: How to Manage Mac and mobile devices leveraging your existing infrastructure, presented by Centrify.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

The Government Says It Has a Policy on Disclosing Zero-Days, But Where Are the Documents to Prove It?

March 30, 2015 Added by:Electronic Frontier Foundation

Despite the White House’s claim that it had “reinvigorated” its policies in spring 2014 and “established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure,” none of the documents released in response to our lawsuit appear to be newer than 2010.

Comments  (0)

A70a600d7c593ca50cc6639cd64ed71a

Threat Intelligence: A Force Multiplier for Security Pros

March 26, 2015 Added by:Joseph Pizzo

With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.

Comments  (0)

60dcc0d0012f3056175c01d54c2e1722

Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security

March 26, 2015 Added by:Kevin Watson

The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.

Comments  (0)

6d117b57d55f63febe392e40a478011f

CSIS Issues Recommendations for Threat Intelligence Sharing

March 25, 2015 Added by:Anthony M. Freed

The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »