Encryption
Taking Advantage of Network Segmentation in 2019
January 16, 2019 Added by:Reuven Harrison
Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.
Comments (0)
The Soaring Success of Cybercrime as a Company
March 22, 2018 Added by:A. N. Ananth
In a raging cyber war, it pays to think like cybercriminals and understand how they are organizing and operating as corporations. While enterprises won’t resort to cybercrime, we need to understand, outthink and outplay our adversaries at a strategic, not just tactical, level.
Comments (0)
Four Ways to Protect Your Backups from Ransomware Attacks
November 22, 2017 Added by:Rod Mathews
Backups are a last defense and control from having to pay ransom for encrypted data, but they need protection also.
Comments (0)
Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
November 03, 2017 Added by:Sanjay Ramnath
Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.
Comments (0)
Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update
October 17, 2017 Added by:James E. Lee
In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.
Comments (0)
Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!
October 12, 2016 Added by:Vanishree Rao
While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.
Comments (0)
Insider Threat: Why Negligence Is More Dangerous Than Malevolence
August 26, 2016 Added by:Eric Aarrestad
When addressing the risk of Insider Threats, we must look beyond those who are intentionally doing harm and place equal emphasis on those who are simply doing their job.
Comments (0)
What Elements Are Needed for Security Analytics Success?
August 23, 2016 Added by:Mike Paquette
Not all security analytics solutions are created equal. There are five key characteristics critically important to ensuring that your security analytics are effective and capable of stopping today’s advanced threats.
Comments (0)
One Encryption Backdoor Is One Too Many
August 11, 2016 Added by:Joe Levy
Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.
Comments (0)
Don't Let the Cure Become the Disease: Granular Control Is the Only Answer to Security Woes Caused By Encryption
June 20, 2016 Added by:Peter Martini
With the proper controls in place, organizations don’t have to fear encryption. Hackers can only succeed in exploiting encryption when organizations lack the right tools to fight back.
Comments (0)
End-to-end Encryption, Today -- Loophole Closed or Moved?
April 22, 2016 Added by:Vanishree Rao
End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.
Comments (0)
A Security Lesson from Down Under: Australia’s Banking App Malware Theft
April 20, 2016 Added by:Harvey Boulter
The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.
Comments (0)
Five Key Security Questions to Ask Your Enterprise Communications Vendor
April 05, 2016 Added by:Michael Machado
The more questions you ask, the more you, as a customer, will have the information you need to determine if a cloud vendor is ready to be your partner in the shared security model that cloud computing requires. Here are five to start with for your Unified Communications as a Service (UCaaS) vendor.
Comments (0)
Encryption and Privacy Debates Highlight Serious Challenges for Both Consumers and Businesses
March 24, 2016 Added by:Robert Grapes
As we become more connected through wearables, mobile devices, IoT devices in our homes, security cameras, health trackers, and online bank accounts, we become exponentially more vulnerable to criminal attacks and government intrusion. Civil liberties, anonymity, personal safety, home security, children safety—all is at risk.
Comments (0)
Bringing Innovation into Cyberdefense Technologies
February 22, 2016 Added by:Larry Karisny
When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.
Comments (0)
Yes. The World Needs More Security Predictions
February 17, 2016 Added by:Dan Lohrmann
With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...
Comments (0)
- The Rise of Ransomware and the Consequences for SMBs
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them