Security Training

1b95dd6456ee7ab6df000bf89b4acdcc

STOP, Collaborate and Listen: Where Employee Vulnerabilities Put Data at Risk

September 07, 2016 Added by:Ron Arden

Whether it is the company’s trade secrets, product designs, financial data or the personal information of customers, businesses must protect high value information from landing in the hands of the wrong individual or threat group.

Comments  (0)

B8c37e33defde51cf91e1e03e51657da

Insider Threat: Why Negligence Is More Dangerous Than Malevolence

August 26, 2016 Added by:Eric Aarrestad

When addressing the risk of Insider Threats, we must look beyond those who are intentionally doing harm and place equal emphasis on those who are simply doing their job.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

A View from the Top: The C-Suite Steps Up as Cyber Security Threats Surge

July 13, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives—especially those not directly involved with deploying security programs—to fully participate and contribute on a continuous basis.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

What a Risk-Based Approach to Security Means for Your Business

June 20, 2016 Added by:Steve Durbin

Executives are familiar with the benefits of cyberspace and how the Internet, and today’s usage of connected devices, increases innovation, collaboration, efficiency, competitiveness and commitment to customers, but many struggle with assessing the risks versus the rewards.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

Why Is There a Shortage of Security Talent?

June 03, 2016 Added by:Ajit Sancheti

Embracing new technologies that help intelligently automate parts of security to provide overwhelmed security teams a hand is a start. But in the long run, bigger changes to security strategies will need to take place. Everyone in a company needs to be responsible for security, not just the CISO.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Insider Threats in Today's Digital Age

April 05, 2016 Added by:Steve Durbin

Most research on the insider threat focuses on malicious behavior. However, insider negligence and insider accidents comprise a greater and growing proportion of information security incidents. Chief Information Security Officers (CISOs) who limit their thinking to malicious insiders may be gravely miscalculating the risk.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

B1ea789c3db7f59b11f88e8980c38e7b

CISOs: Five Ways to Ramp Up Your Security Strategy

December 08, 2015 Added by:Kirsten Bay

Where is a cyber security professional to begin when the stakes are set against the corporation? The key is better preparation. Below are five steps that will provide an approach to help build a strategy that offers the potential to outsmart the attacker.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

68209dc20595f15c48ddcfbe866ef7b1

Organizations Must Wake Up To Hidden Security Vulnerabilities

December 03, 2015 Added by:Darren McCue

Time and again we see companies neglecting to protect themselves at the most basic, key levels – on both the physical and digital sides – leaving dangerous gaps in coverage to be exploited farther down the complexity chain.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

D3952b85dfe9e8b3b9c453532beb7208

Leveraging Graph Technology to Securely Grant Employee Access

November 12, 2015 Added by:Emil Eifrem

Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Can CTF Players Replace Professional Penetration Testers?

September 23, 2015 Added by:Ilia Kolochenko

The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Get Physical with your Physical Space

August 17, 2015 Added by:Jayson Wylie

Current social engineering practice has gone beyond mail phishing scams and there is high probability that there is potential of a malicious presence in the mix within the place of work.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »