Infosec Island

4b07a2ec18add0e3dda7f96842143f05

PyRoMine Malware Sets Security Industry on Fire

May 03, 2018 Added by:Boris Vaynberg

Despite all the investments in cyber protection and prevention technology, it seems that the cyber terrorist’s best tool is nothing more than variations on previous exploits.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Avoiding Holes in Your AWS Buckets

April 12, 2018 Added by:Sanjay Kalra

Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.

Comments  (0)

809e5bf42b3c61540fdf08a772a9d960

The Three Great Threats to Modern Civilization

April 12, 2018 Added by:Jessica Lavery

There are three main threats to our modern civilization that could cause humanity to go the way of the ancient Mayans.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

2020 Vision: How to Prepare for the Future of Information Security Threats

April 06, 2018 Added by:Steve Durbin

A highlight of the top nine threats to information security over the next two years.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

The Night the Lights Went out in Georgia (Almost)

March 29, 2018 Added by:Ben Carr

The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.

Comments  (0)

E8643ec2aea49d246d020cf412aa5d05

Is Blockchain Really Disruptive in Terms of Data Security?

March 26, 2018 Added by:Mary Callahan

Blockchain can provide transparency, decentralization, efficiency, security, and other benefits, revolutionizing multiple industries.

Comments  (0)

F93757731f02bb253ed824020ef2cf6e

Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed

March 26, 2018 Added by:David Pearson

Context is everything: connecting the dots between indicators of interesting activity across different aspects of an environment is the way to provide unparalleled alert fidelity.

Comments  (0)

A4c42684a8889958a83ecca5d2fe59e5

The Soaring Success of Cybercrime as a Company

March 22, 2018 Added by:A. N. Ananth

In a raging cyber war, it pays to think like cybercriminals and understand how they are organizing and operating as corporations. While enterprises won’t resort to cybercrime, we need to understand, outthink and outplay our adversaries at a strategic, not just tactical, level.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)

0da151db886b8b40e0a1d051485bedd3

An Open Letter to AWS CEO Andy Jassy on Cloud Security Innovation

March 16, 2018 Added by:Brian Ahern

Brian Ahern, CEO & Chairman of Threat Stack, writes an open letter to Amazon Web Services CEO Andy Jassy.

Comments  (0)

F7d0f3bd3db3ac1238b1165855b93542

The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking

February 09, 2018 Added by:Ross Rustici

Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

86e0caefdf114afad6827dea09ba79c6

What Global Manufacturers Need to Know About Security in the Cloud

January 08, 2018 Added by:Srivats Ramaswami

Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats You Need to Know About in 2018

January 03, 2018 Added by:Steve Durbin

In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

The IT Security Lessons from 2017

December 22, 2017 Added by:Avishai Wool

A look at the IT security lessons that can be learned from 2017

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »