Security Awareness

E54bce6ca0fef52e62d84b5ccedb4428

The Cyber Car: The Intimate Tango of the 21st Century

May 25, 2017 Added by:Asaf Atzmon

The automotive industry is now at a point of no return. Cyber is here to stay and the industry is very well aware of the vulnerability of connected cars.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Adylkuzz: WannaCry’s Older and More Devious Cousin

May 25, 2017 Added by:Kevin Magee

You might be immune to infection by WannaCry because you've already been infected by Adylkuzz.

Comments  (0)

4d0ac884f6fdb0c44f281653697aa2cc

The Administrative Credentials Security Hole

May 24, 2017 Added by:Chris Stoneff

Here’s the problem: the existence of administrative credentials stored on machines throughout the network.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Reducing Identity-related Risks: The Complete Package or a One-Man Show?

May 24, 2017 Added by:Jackson Shaw

Cybersecurity professionals are increasingly buckling down on identity and access management (IAM) to protect their critical data assets.

Comments  (0)

F91acd8d7037a996f8343c9b924b3f5d

The Enterprise IoT Security Checklist for Today - and Tomorrow

May 10, 2017 Added by:Zachary Crockett

Here's a list of components of an IoT system that must be reviewed for possible vulnerabilities.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

May 09, 2017 Added by:Scott Schneider

Bad guys will continue to prey upon the path of least resistance - third parties. It’s up to you to ensure your organization takes a comprehensive and risk based approach - rather than focusing solely on compliance.

Comments  (0)

A5f2aa8b34c3021fca4738cd12cbd323

We Can’t Control Devices and People, but We Can Control the Network

April 26, 2017 Added by:Dennis Reilly

Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.

Comments  (0)

E14ebc073505fd5a94f8c16d9be81ec2

Smart Cities Must Be Secure Cities

April 14, 2017 Added by:Jack Huffard

The time spent to get the security of smart cities right out of the gate will save taxpayers significant sums in the future by not having to compensate for security issues later.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Plugging the Gaps in Your Incident Response

April 13, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, explains how two gaps may be holding back your incident response strategy – and how to fill them.

Comments  (0)

7f2b2f3993942d8fffe0959b532816ea

Growing Risk In IoT & Mobile App Security

April 07, 2017 Added by:Mandeep Khera

IoT and mobile app security is at considerable risk, as confusion of who owns security within the development, testing and implementation process remains in question.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

Are Job Seekers at Risk of a Cyber Breach?

April 07, 2017 Added by:Amir Geri

Job seekers are regularly expected to input personal information about themselves to company and state databases, but it should be guaranteed that their information will remain secure.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence

April 06, 2017 Added by:Larry Karisny

The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.

Comments  (0)

C33ba283f54a267b479325c67e2ea466

4 Things that Make Cloud Compliance Harder Than You Think

April 06, 2017 Added by:John Martinez

There are some factors to take into consideration that may make compliance in the cloud a bit more challenging

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Bracing for the Future of Information Security Threats

April 04, 2017 Added by:Steve Durbin

New attacks will impact both business reputation and shareholder value, and cyber risk exists in every aspect of the enterprise. Here are the top nine threats to information security over the next two years.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Stop Doing Four Things—and Convince Your Execs and Board to Properly Fund Cybersecurity

March 28, 2017 Added by:Kevin Magee

If you want to convince your execs and board to properly fund cybersecurity, stop telling them scary stories and using Hollywood clichés to make your case.

Comments  (0)

D39e8a0d81c2a146f879631550fb065b

GRC: Going Beyond the Acronym

March 10, 2017 Added by:Corey Wilburn

An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »