Security Awareness

D36d0936f0c839be7bf2b20d59eaa76d

Five Security Threats Businesses Should Prepare for in 2016

January 28, 2016 Added by:Steve Durbin

After reviewing the current threat landscape, there are five prevalent security threats that the Information Security Forum believes businesses need to prepare for in 2016. These include, but are not limited to, the unintended consequences of state intervention, Big Data, mobile applications and the Internet of Things (IoT), cybercrime and the growing skills gap in the information security industr...

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

E9484ac4701ff55d18cb7e5763b7e2ca

Why Companies Fail to Secure Their Web Apps

December 14, 2015 Added by:Ilia Kolochenko

The five things that companies do to make hacking into their websites and web applications even easier for the hackers.

Comments  (0)

B1ea789c3db7f59b11f88e8980c38e7b

CISOs: Five Ways to Ramp Up Your Security Strategy

December 08, 2015 Added by:Kirsten Bay

Where is a cyber security professional to begin when the stakes are set against the corporation? The key is better preparation. Below are five steps that will provide an approach to help build a strategy that offers the potential to outsmart the attacker.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

68209dc20595f15c48ddcfbe866ef7b1

Organizations Must Wake Up To Hidden Security Vulnerabilities

December 03, 2015 Added by:Darren McCue

Time and again we see companies neglecting to protect themselves at the most basic, key levels – on both the physical and digital sides – leaving dangerous gaps in coverage to be exploited farther down the complexity chain.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Why Creating Automated User Provisioning Workflows is Important

December 01, 2015 Added by:Identropy

User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Complex and Portable Passwords

November 10, 2015 Added by:Jayson Wylie

A person needing to keep and collect passwords for resources, throughout their lives, can create situations where maintaining them requires constant resets or means that could lack security.

Comments  (0)

E9484ac4701ff55d18cb7e5763b7e2ca

Can CTF Players Replace Professional Penetration Testers?

September 23, 2015 Added by:Ilia Kolochenko

The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

BYOx: Developing and Deploying Effective Strategies to Safeguard Data

September 16, 2015 Added by:Steve Durbin

In today’s global, connected society, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, organizations need to manage risks in ways beyond those traditionally handled by the information security function, since new attacks will impact bot...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Beware of the Imitations

September 16, 2015 Added by:Jayson Wylie

There have been reports of compromised Cisco IOS files being run in the wild. There have also been warnings about reversed engineered IOS images been detected.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Wireless Security 101

September 09, 2015 Added by:Jayson Wylie

Not everyone is technology savvy and push to get something to function verses securing it to the extent that it should be. Even though the latest wireless routers will use the more up-to-date security configurations, there are older setups that may not be adequate.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Get Physical with your Physical Space

August 17, 2015 Added by:Jayson Wylie

Current social engineering practice has gone beyond mail phishing scams and there is high probability that there is potential of a malicious presence in the mix within the place of work.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »