Security Awareness

E595c1d49bf4a26f8e14ce59812af80e

No Quick Fixes for Home Depot After Record Cyberattack

September 17, 2014 Added by:Patrick Oliver Graf

America’s largest home improvement retailer seems to have a repair for everything, but after news that its payment systems had been breached, Home Depot has a lot of work ahead to get its own house in order. It faces a long road as it repairs its reputation, its relationships with customers and its network security.

Comments  (0)

8b2a9c176d358811a479f771a5874c1b

3 Things To Consider When You Revisit Your Backup System

September 17, 2014 Added by:Sahba Kazerooni

When all is well, there is nothing to worry about. A poorly configured backup system, however, can make life more than a little tricky when you can’t restore your files effectively or efficiently.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

The Big Three Part 3: Incident Response

September 16, 2014 Added by:Brent Huston

In this installment, we’ll discuss the importance of accompanying incident detection with an effective, well-practiced incident response plan.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Challenges with MSSPs?

September 11, 2014 Added by:Anton Chuvakin

In essence, MSSP may work for you, but you need to be aware of these and other challenges as well as to plan how you will work with your MSSP partner

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Managing Security in a Highly Decentralized Business Model

September 09, 2014 Added by:Rafal Los

Information Security leadership has and will likely continue to be part politicking, part sales, part marketing, and part security

Comments  (0)

798062984af63011823d48fef7863cd8

Security and Today’s Managed Service Providers

September 04, 2014 Added by:Paul Lipman

Small and medium size businesses tend not to have the budget, resources or skills to tackle the increasingly complex security challenge on their own, and are increasingly turning to Managed Service Providers (MSPs) to protect their data, network, employees, and customers from cybercrime.

Comments  (1)

Af7244bb99debb4a1152fa49a993a05c

Event Preview: Suits and Spooks London: Sept. 12, 2014

September 03, 2014 Added by:Eduard Kovacs

The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security on a Weak IT Foundation

September 02, 2014 Added by:Rafal Los

It should be rather obvious that a weak foundation cannot support a tall, strong structure. You simply don't have the stuff it takes to hold it all up, from a building perspective.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Address Privacy During Social Media Marketing

September 01, 2014 Added by:Rebecca Herold

Here are fourteen things to keep in mind, and do, to protect privacy while doing marketing activities on social media.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Indelicate Balance Between "Keep it Working" and "Keep It Safe"

August 28, 2014 Added by:Rafal Los

Security professionals continue to fool themselves into believing we walk a delicate balance between keeping the business functional, and keeping it safe (secure).

Comments  (2)

9ef2480a65cde87091d69a3b8a7fec3a

Why What You Don’t Know, May Hurt You

August 28, 2014 Added by:Stephen Dodson

We are no longer dealing with teenage hackers or disgruntled young adults with a political or social ax to grind. The real threat to your security comes from advanced cybercriminal organizations.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

How to Help

August 25, 2014 Added by:Wendy Nather

There are a few movements afoot to help improve security, and the intentions are good. However, to my mind some are just more organized versions of what we already have too much of: pointing out what's wrong, instead of rolling up your sleeves and fixing it.

Comments  (1)

B689dd1362bef7eb372a540d3b6e6287

Preparing for a Successful IAM Integration Project (Part 1 of 2)

August 20, 2014 Added by:Identropy

If you have ever hired a Professional Services team to do an integration project, you know that it takes planning and tenacity to pull it through to the end. Depending on the breadth of the integration, the difficulty of accomplishing this varies.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Getting in Our Own Way

August 18, 2014 Added by:Rafal Los

The security community has this widely-understood reputation for self-destruction. This is not to say that other communities of professionals don't have this issue, but I don't know if the negative impact potential is as great.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Why Your Enterprise Most Likely Doesn't Have a Zero-Day Problem

August 11, 2014 Added by:Rafal Los

It should by now be clear if you're a security professional that the average enterprise struggles with even the most basic security hygiene.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »