Security Training

Ffc4103a877b409fd8d6da8f854f617e

Cloud Security Alliance Shares Security Guidance for Crypto-Assets Exchange

April 13, 2021 Added by:InfosecIsland News

The Cloud Security Alliance (CSA) has released new Crypto-Asset Exchange Security Guidelines, a set of guidelines and best practices for crypto-asset exchange (CaE) security.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Intel Corp. to Speak at SecurityWeek Supply Chain Security Summit

March 08, 2021 Added by:InfosecIsland News

Join Intel on Wednesday, March 10, at SecurityWeek’s Supply Chain Security Summit, where industry leaders will examine the current state of supply chain attacks. Hear Intel’s experts discuss the need for transparency and integrity across the complete product lifecycle, from build to retire.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer

February 24, 2021 Added by:InfosecIsland News

Software development platform GitHub announced on Wednesday that it has hired Mike Hanley as its new Chief Security Officer (CSO).

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Reddit Names Allison Miller as Chief Information Security Officer (CISO)

February 22, 2021 Added by:InfosecIsland News

Social news community site Reddit announced has hired Allison Miller as Chief Information Security Officer (CISO) and VP of Trust.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Names Ryan Naraine as Editor-at-Large

January 18, 2021 Added by:InfosecIsland News

SecurityWeek has named Ryan Naraine as Editor-at-Large, adding a veteran cybersecurity journalist and podcaster to its editorial team.

Comments  (0)

22c2de9dd51537147e2042c8372d62c5

Securing the Hybrid Workforce Begins with Three Crucial Steps

September 02, 2020 Added by:Rick Vanover

The global shift to a remote workforce has redefined the way organizations structure their business models.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)

4ebb71b142fbe23222c175ac358e4700

The Big 3: Top Domain-Based Attack Tactics Threatening Organizations

January 17, 2020 Added by:Zack Allen

Attackers often buy ‘look-alike’ domains in order to impersonate a specific brand online.

Comments  (0)

5fbfa7473f12e37a0ebbc623dcd9619f

Password Shaming Isn’t Productive – Passwords Are Scary Business

January 15, 2020 Added by:Tim Mackey

With the complexity of consumer devices only increasing, contextual security should be a priority for all – a situation which would avoid password shaming.

Comments  (0)

Da780506fe493b3e556b28a66eed1e1e

Six Reasons for Organizations to Take Control of Their Orphaned Encryption Keys

December 19, 2019 Added by:Shwetha Sankari

Enforcing encryption key management can effectively bridge the gaps in your enterprise privileged access security strategy.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

The Cybersecurity Skills Gap: An Update for 2020

December 18, 2019 Added by:Sam Bocetta

2020 will be a critical juncture for the entire cybersecurity sector

Comments  (0)

019f0bfa701317d0e838d7bb01218770

How Ethical Hackers Find Weaknesses and Secure Businesses

September 11, 2019 Added by:Johnny Rice

Approaching your currently implemented security as a target to beat or bypass is the strongest and fastest way to find any flaws that may already exist.

Comments  (0)

239132446c9379ed143375ff11db6a65

Three Strategies to Avoid Becoming the Next Capital One

August 30, 2019 Added by:George Gerchow

Three strategies to preventing catastrophic cloud security issues.

Comments  (0)

D2dfc0582d6b23f510801d8a95d54c7c

Eight Steps to Migrate Your SIEM

July 22, 2019 Added by:Trevor Daughney

The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.

Comments  (0)

5864aed0a807a1e29050f9221c6cfa67

Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season

June 14, 2019 Added by:David Stuart

Tips for cleaning and securing your online data this spring.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Building Modern Security Awareness with Experiences

June 14, 2019 Added by:Perry Carpenter

Think about your own organization’s culture and then find ways to create immersive, engaging experiences that will resonate with your people.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked