Security Awareness

7d55c20d433dd60022642d3ab77b8efb

Universities at risk of Data Breaches: Is it Possible to Protect Them?

July 17, 2015 Added by:Alexander Polyakov

As all university networks are complex and consist of numerous modules and there are numerous vulnerabilities in them, protecting them seems a nightmare for any IT team. Cybersecurity is not some separate steps taking from time to time, but the ongoing process.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Enable the Business? Sometimes Security Must Say “NO”…

June 25, 2015 Added by:Anton Chuvakin

As a security technologist you may be asked to do the impossible.

Comments  (0)

A70a600d7c593ca50cc6639cd64ed71a

Thoughts on the Active Defense Debate

June 24, 2015 Added by:Joseph Pizzo

Organizations large and small need to run a better defense and get better at securing their assets, only then should an attack response be considered.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Privacy Concerns Changing the Playing Field for Brands

June 24, 2015 Added by:Peter Zavlaris

New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Half of All Websites Tested Failed Security and Privacy Assessment

June 23, 2015 Added by:Anthony M. Freed

Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

We Need a New FUD

June 23, 2015 Added by:Dave Shackleford

I’m willing to argue that “breach weariness” is most certainly never going to be the catalyst for increased investment in security, and really bad/big breaches likely won’t either.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part II)

June 22, 2015 Added by:Steve Durbin

Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

“For me? You shouldn’t have. No, really…”

June 18, 2015 Added by:Malwarebytes

More often than not, the sad truth is that if you’re worrying after the creation stage, you’ve probably left it too late and those juicy secrets are going to escape. Deploying a healthy dose of caution before setting digital pen to paper is always going to pay off.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

OPM Breach: Where is the Data Going?

June 16, 2015 Added by:Peter Zavlaris

The OPM breach has drawn national attention and rightfully so. However, at first blush the attack seems typical of a particular threat actor that continues to successfully breach large organizations and steal PII.

Comments  (0)

Default-avatar

Fear Nothing: The Gamers Approach To Building a SOC

June 16, 2015 Added by:Seth Geftic

While it is not a silver bullet, the security teams that are most successful at defending their organizations have done so by standing up (or at least outsourcing) their own Security Operations Center (SOC).

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part I)

June 15, 2015 Added by:Steve Durbin

Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Once More on Insta-Fail Security Policies – Rant Alert!

June 15, 2015 Added by:Anton Chuvakin

For a while, I was under impression that my deep disdain for “insta-FAIL security policies” (i.e. those written without any chance of ever being complied with, even during the policy-writing process) knows no equal.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security 2020: What Direction is Cyberspace Heading?

June 15, 2015 Added by:Dan Lohrmann

By almost any measure, cyber danger doubled last year and hackers are now breaking into enterprise systems, stealing sensitive data and causing business disruption at an unprecedented pace.

Comments  (0)

5dbdfb006bfb96cb7115ce3a5a985171

Online Self-Policing: Check Yourself Before You Wreck Yourself

June 11, 2015 Added by:Lisa Huff

As we post to Facebook and Twitter, and share pictures via Instagram or Pinterest, we don’t stop to think about how our posts or pictures could come back to haunt us later in life.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked