Latest Posts

F142e224c520497854138dc9fabbac94

Stop Living with FUD: Build Security with Confidence, Assurance and Resiliency

December 23, 2016 Added by:Mike Kail

With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Security of IIoT Devices: Time to Operate in Tandem with the Drive for Productivity?

December 22, 2016 Added by:Jalal Bouhdada

Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

The Dark Side of the Force: Hacktivism Takes Center Stage in 2016

December 21, 2016 Added by:Dan Lohrmann

A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing Executive Buy In as the Cyber Security Threat Landscape Expands

December 16, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives — especially those not directly involved with deploying security programs — to fully participate and contribute on a continuous basis.

Comments  (0)

76accef69a60a94bb14766fe8bc324ef

The Home of Cyber Security Best Practice: Public or Private Sector?

December 15, 2016 Added by:Bernard Parsons

There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.

Comments  (0)

0edff2c451ca736450f0872ef3e00314

Driving ROI from Threat Intelligence & Security Operations

December 14, 2016 Added by:Meny Har

Security operations teams can no longer afford the time lost with threat intelligence operating in a separate silo. Only by truly weaving TI into the core security fabric and workflow can it lead to accelerating threat mitigation.

Comments  (0)

E61bd0e5d76b76868ffe7b6574f67796

Top 10 Cloud and Security Predictions for 2017

December 14, 2016 Added by:Shehzad Merchant

In the coming year, we might see a number of significant changes with respect to both the public cloud and information security.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

The IT Security Flip: Inside More of a Concern than Outside

December 09, 2016 Added by:Ajit Sancheti

About half (49%) of IT security professionals are more concerned about internal threats than external threats.

Comments  (0)

Ee5f058b283cdc6dba84464d453801d7

Decrypting the Gender Imbalance: Hiring Women in Cybersecurity

December 09, 2016 Added by:Michelle Johnson Cobb

Organizations that seek to achieve greater representation of women in their IT security teams should maintain a steady, multi-faceted approach to recruitment — and continually evaluate their performance in terms of the advancement and retention of women in this area.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Internet Companies Partner to Combat Terrorist Content

December 07, 2016 Added by:Ionut Arghire

Major Internet players, including Facebook, Microsoft, Twitter, and YouTube, are teaming up to create a database designed help combat the spread of terrorist content online.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

The 4 Cs of Automated Incident Response

December 06, 2016 Added by:Nathan Burke

We’re currently in a phase in security where there are an ever-expanding number of automated incident response solutions, and no standard method for judging quality or value.

Comments  (0)

8cfea2767deef845d26a5bde4448bf51

Cybersecurity and Donald Trump: Where Do We Go From Here?

December 02, 2016 Added by:Kasey Cross

Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.

Comments  (0)

18d2ccc39431a1f63d67dd3252263400

The Hidden Security Risks of Cloud APIs

December 02, 2016 Added by:Sam Rehman

With the inherent security flaws taken care of, cloud software can take full advantage of the benefits of APIs without exposing themselves or their clients to attack.

Comments  (0)

370ef523fe9b1e0fd202d26a56e3584a

Holiday Shopping Security Tips for Consumers

December 02, 2016 Added by:Dan Ross

Cyber Monday kicked off a month of great deals for consumers and high profits for online retailers. Unfortunately, this time of the year also offers hackers different ways to launch cyber-attacks, steal information, and compromise devices.

Comments  (0)

C42db1d900b3553c87ca1abc2c4cb0f9

5 Signs You Need to Upgrade Your Legacy IAM

December 02, 2016 Added by:James Litton

A modern identity and access management (IAM) solution is not a multi-year journey anymore.

Comments  (0)

F3c62aff0615016b198f1353210017a8

Mobile Endpoint Security: 3 Helpful Tips to Protect Sensitive Corporate Data

December 02, 2016 Added by:Brian NeSmith

Security is not achieved by implementing a product, and companies need to make sure they are actively securing their company every day.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Authorities Disrupt Massive Malware Management Platform

December 01, 2016 Added by:Ionut Arghire

As part of a four-year long investigation, Europol and global partners disrupted the international criminal infrastructure platform known as “Avalanche".

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Medusa DDoS Botnet Slams Russian Banks

November 18, 2016 Added by:Ionut Arghire

The recently discovered Medusa IRC bot used to carry out distributed denial of service (DDoS) attacks against the websites of a couple of Russian websites has emerged recently, researchers with the Russian security firm Doctor Web reveal.

Comments  (0)

74a3faa048e151b7a9b61267399d79e3

Why Security Compliance Is a Continuous Process, and Not Just a Check in the Box!

November 18, 2016 Added by:Tim Prendergast

In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Security vs. Privacy: Securing Your Critical Information Assets

November 17, 2016 Added by:Steve Durbin

Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.

Comments  (0)