Security Training

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

B1ea789c3db7f59b11f88e8980c38e7b

CISOs: Five Ways to Ramp Up Your Security Strategy

December 08, 2015 Added by:Kirsten Bay

Where is a cyber security professional to begin when the stakes are set against the corporation? The key is better preparation. Below are five steps that will provide an approach to help build a strategy that offers the potential to outsmart the attacker.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

68209dc20595f15c48ddcfbe866ef7b1

Organizations Must Wake Up To Hidden Security Vulnerabilities

December 03, 2015 Added by:Darren McCue

Time and again we see companies neglecting to protect themselves at the most basic, key levels – on both the physical and digital sides – leaving dangerous gaps in coverage to be exploited farther down the complexity chain.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

D3952b85dfe9e8b3b9c453532beb7208

Leveraging Graph Technology to Securely Grant Employee Access

November 12, 2015 Added by:Emil Eifrem

Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.

Comments  (0)

E9484ac4701ff55d18cb7e5763b7e2ca

Can CTF Players Replace Professional Penetration Testers?

September 23, 2015 Added by:Ilia Kolochenko

The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

BYOx: Developing and Deploying Effective Strategies to Safeguard Data

September 16, 2015 Added by:Steve Durbin

In today’s global, connected society, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, organizations need to manage risks in ways beyond those traditionally handled by the information security function, since new attacks will impact bot...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Get Physical with your Physical Space

August 17, 2015 Added by:Jayson Wylie

Current social engineering practice has gone beyond mail phishing scams and there is high probability that there is potential of a malicious presence in the mix within the place of work.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Enable the Business? Sometimes Security Must Say “NO”…

June 25, 2015 Added by:Anton Chuvakin

As a security technologist you may be asked to do the impossible.

Comments  (0)

A70a600d7c593ca50cc6639cd64ed71a

Thoughts on the Active Defense Debate

June 24, 2015 Added by:Joseph Pizzo

Organizations large and small need to run a better defense and get better at securing their assets, only then should an attack response be considered.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Privacy Concerns Changing the Playing Field for Brands

June 24, 2015 Added by:Peter Zavlaris

New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Half of All Websites Tested Failed Security and Privacy Assessment

June 23, 2015 Added by:Anthony M. Freed

Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »