Infosec Island News

D36d0936f0c839be7bf2b20d59eaa76d

Why Cyber Security Should Be at the Top of Your Christmas List

December 17, 2020 Added by:Steve Durbin

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

How Extreme Weather Will Create Chaos on Infrastructure

October 21, 2020 Added by:Steve Durbin

Extreme weather events will soon become more frequent and widespread, devastating areas of the world that typically don’t experience them and amplifying the destruction in areas that do.

Comments  (0)

160a4cbe9073658eb91a86d8817cbd42

BSIMM11 Observes the Cutting Edge of Software Security Initiatives

October 21, 2020 Added by:Taylor Armerding

In addition to helping an organization start an SSI, the BSIMM also gives them a way to evaluate the maturity of their SSI.

Comments  (0)

Default-avatar

Sustaining Video Collaboration Through End-to-End Encryption

October 21, 2020 Added by:Michael Armer

By infusing end-to-end encryption into any video strategy, it ensures not only the sustainability of the channel, but the businesses that rely on it.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Will Robo-Helpers Help Themselves to Your Data?

September 08, 2020 Added by:Steve Durbin

Are you sure that your robo-helpers are secure?

Comments  (0)

671084740e306472f992b176b92ad051

COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider

August 26, 2020 Added by:Terry Ray

Despite the COVID-19 pandemic, companies are obligated to comply with many laws governing data security and privacy

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Expect Behavioral Analytics to Trigger a Consumer Backlash

August 10, 2020 Added by:Steve Durbin

The deployment of cameras, sensors and applications in public and private places for behavioral analytics will be followed by consumer and regulatory backlash.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

No Silver Bullet for Addressing Cybersecurity Challenges During Pandemic

August 10, 2020 Added by:Liviu Arsene

As the coronavirus pandemic forced organizations to migrate to a work-from-home context, security professionals faced new challenges.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Augmented Reality Will Compromise the Privacy and Safety of Attack Victims

July 08, 2020 Added by:Steve Durbin

Augmented Reality (AR) technologies will provide new opportunities for attackers to compromise the privacy and safety of their victims.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Threat Horizon 2022: Cyber Attacks Businesses Need to Prepare for Now

May 01, 2020 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

2054518f64771a7898b1b5d0a1e146cc

Examining Potential Election Vulnerabilities: Are They Avoidable?

April 07, 2020 Added by:Tim Matthews

In the U.S and global communities, election security is a large concern.

Comments  (0)

5fbfa7473f12e37a0ebbc623dcd9619f

Password Shaming Isn’t Productive – Passwords Are Scary Business

January 15, 2020 Added by:Tim Mackey

With the complexity of consumer devices only increasing, contextual security should be a priority for all – a situation which would avoid password shaming.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Five Key Cyber-Attack Trends for This Year

January 14, 2020 Added by:Marc Wilczek

5 key cyber-attack trends that are expected to develop during the coming months.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

20/20 Vision on 2020's Network Security Challenges

January 13, 2020 Added by:Avishai Wool

Organizations will likely need to embrace more automation across all security and compliance-related processes.

Comments  (0)

73b84d66b198db6ac26bc8a35d479042

Is Cybersecurity Getting Too Complex?

January 13, 2020 Added by:Sam Rubin

To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »