Security Awareness

F3bd25e6f3b8f01dc21a92182761fb8a

Benchmarking the State of the CISO in 2020

March 27, 2020 Added by:Marc Wilczek

A run-down of Cisco's 2020 CISO Benchmark Report.

Comments  (0)

7e5878d1746c69c0ac1f9b86dfcc5ed9

When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)

73b84d66b198db6ac26bc8a35d479042

Is Cybersecurity Getting Too Complex?

January 13, 2020 Added by:Sam Rubin

To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats Organizations Must Prepare for in 2020

January 08, 2020 Added by:Steve Durbin

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.

Comments  (0)

Da780506fe493b3e556b28a66eed1e1e

Six Reasons for Organizations to Take Control of Their Orphaned Encryption Keys

December 19, 2019 Added by:Shwetha Sankari

Enforcing encryption key management can effectively bridge the gaps in your enterprise privileged access security strategy.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing the Internet of Things (IoT) in Today's Connected Society

November 19, 2019 Added by:Steve Durbin

The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Cybersecurity and Online Trading: An Overview

October 25, 2019 Added by:Sam Bocetta

Take a look at how and why the risks of international trade are increasing, and the political response to this.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Artificial Intelligence: The Next Frontier in Information Security

October 23, 2019 Added by:Steve Durbin

The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security.

Comments  (0)

Ff19c51d0400a9d7c1c7bb44749741cf

Five Main Differences between SIEM and UEBA

October 23, 2019 Added by:Nilesh Dherange

Five ways in which SIEM and UEBA technology differs.

Comments  (0)

E134f0b14f264b3818f35140571c37f8

For Cybersecurity, It’s That Time of the Year Again

October 17, 2019 Added by:Assaf Harel

It’s a race against time and a reactive security approach that waits for a vulnerability to be discovered and then issues patches is lacking, to put it lightly.

Comments  (0)

019f0bfa701317d0e838d7bb01218770

How Ethical Hackers Find Weaknesses and Secure Businesses

September 11, 2019 Added by:Johnny Rice

Approaching your currently implemented security as a target to beat or bypass is the strongest and fastest way to find any flaws that may already exist.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

New Passive RFID Tech Poses Threat to Enterprise IoT

September 11, 2019 Added by:Sam Bocetta

The accelerating pace of RFID tech will make our lives more convenient. With greater convenience, however, comes a greater need for security solutions.

Comments  (0)

239132446c9379ed143375ff11db6a65

Three Strategies to Avoid Becoming the Next Capital One

August 30, 2019 Added by:George Gerchow

Three strategies to preventing catastrophic cloud security issues.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Ransomware: Why Hackers Have Taken Aim at City Governments

August 19, 2019 Added by:Sam Bocetta

The only way to stop the trend of ransomware is for municipal organizations to build a reputation of having strong security defenses.

Comments  (0)

D2dfc0582d6b23f510801d8a95d54c7c

Eight Steps to Migrate Your SIEM

July 22, 2019 Added by:Trevor Daughney

The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.

Comments  (0)

9fa920b7e1a16185ac7565a871901719

Best Practices for Remote Workers’ Endpoint Security

July 22, 2019 Added by:Mathivanan Venkatachalam

One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »