Infosec Island

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Insider Threats in Today's Digital Age

April 05, 2016 Added by:Steve Durbin

Most research on the insider threat focuses on malicious behavior. However, insider negligence and insider accidents comprise a greater and growing proportion of information security incidents. Chief Information Security Officers (CISOs) who limit their thinking to malicious insiders may be gravely miscalculating the risk.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Protecting Yourself (and Your Organization) from Ransomware

April 04, 2016 Added by:Dan Lohrmann

While media attention has focused on global terrorist incidents and the presidential primaries, a growing number of business emergencies caused by ransomware are sweeping the world. The risk of this situation escalating into a significant public- or private-sector crisis is growing.

Comments  (0)

05a24d7e4020553c4a923a0d8126d8c9

Reducing the Attack Surface is a Fool’s Errand

April 01, 2016 Added by:Paul Morville

This April Fool’s Day, let’s acknowledge that a security strategy focused exclusively on patching and prevention is a fool’s errand and let’s move towards an adaptive approach that includes prevention, detection, continuous visibility and response.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Why You Should Move Security Away from Security

March 31, 2016 Added by:Nimmy Reichenberg

Automating your security processes and aligning the various groups within your IT department is key to successfully migrating selected operations away from your security team.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

OSX Ransomware Offered for Sale in the Underground

February 10, 2016 Added by:Idan Aharoni

Inteller has identified a new Ransomware malware being offered for sale in the underground, dubbed "GinX", which encrypts important and sensitive files on the victim's computer and which targets not only Windows operating systems, but MacBook's OSX as well.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Five Security Threats Businesses Should Prepare for in 2016

January 28, 2016 Added by:Steve Durbin

After reviewing the current threat landscape, there are five prevalent security threats that the Information Security Forum believes businesses need to prepare for in 2016. These include, but are not limited to, the unintended consequences of state intervention, Big Data, mobile applications and the Internet of Things (IoT), cybercrime and the growing skills gap in the information security industr...

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Complex and Portable Passwords

November 10, 2015 Added by:Jayson Wylie

A person needing to keep and collect passwords for resources, throughout their lives, can create situations where maintaining them requires constant resets or means that could lack security.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

How Well Do You Really Know Your Network?

October 06, 2015 Added by:Dan Lohrmann

Recent data breaches, and the international emphasis on critical infrastructure protection, are helping raise awareness of the importance of technology infrastructure improvements. Many organizations are currently building “next-generation” networks with new projects that are well funded. Don’t waste any opportunity to reinvent your network or infrastructure when you get the chance.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Beware of the Imitations

September 16, 2015 Added by:Jayson Wylie

There have been reports of compromised Cisco IOS files being run in the wild. There have also been warnings about reversed engineered IOS images been detected.

Comments  (0)

B7975305d292bb47fb3934171c2a0685

Businesses Should Take a Pass on Traditional Password Security

August 04, 2015 Added by:Geoff Sanders

Historical forms of authentication were never meant for the networked landscape we live in today. The first passwords were adequate authentication solutions only because the systems they secured were isolated. Unfortunately, the isolated systems that pervaded the early days of the computer revolution has set the foundation for authentication in the Internet Age.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »