Infosec Island

F93757731f02bb253ed824020ef2cf6e

Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed

March 26, 2018 Added by:David Pearson

Context is everything: connecting the dots between indicators of interesting activity across different aspects of an environment is the way to provide unparalleled alert fidelity.

Comments  (0)

A4c42684a8889958a83ecca5d2fe59e5

The Soaring Success of Cybercrime as a Company

March 22, 2018 Added by:A. N. Ananth

In a raging cyber war, it pays to think like cybercriminals and understand how they are organizing and operating as corporations. While enterprises won’t resort to cybercrime, we need to understand, outthink and outplay our adversaries at a strategic, not just tactical, level.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)

0da151db886b8b40e0a1d051485bedd3

An Open Letter to AWS CEO Andy Jassy on Cloud Security Innovation

March 16, 2018 Added by:Brian Ahern

Brian Ahern, CEO & Chairman of Threat Stack, writes an open letter to Amazon Web Services CEO Andy Jassy.

Comments  (0)

F7d0f3bd3db3ac1238b1165855b93542

The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking

February 09, 2018 Added by:Ross Rustici

Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

86e0caefdf114afad6827dea09ba79c6

What Global Manufacturers Need to Know About Security in the Cloud

January 08, 2018 Added by:Srivats Ramaswami

Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats You Need to Know About in 2018

January 03, 2018 Added by:Steve Durbin

In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

The IT Security Lessons from 2017

December 22, 2017 Added by:Avishai Wool

A look at the IT security lessons that can be learned from 2017

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)

Abd50ba6fa1aff83aff411c963b09ab5

Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job

December 11, 2017 Added by:Tim Critchley

A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Cyber Security in Today’s Ever-Changing World

October 26, 2017 Added by:Steve Durbin

The contours of cybercriminal enterprise have grown to become specialized, like that of mainstream business, operating out of conventional office spaces, providing a combination of customer support, marketing programs, product development, and other trappings of the traditional business world.

Comments  (0)

F3828ca8c8a9ac7e4fc6a5cc12f52066

Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification

October 13, 2017 Added by:Bogdan Botezatu

Fileless malware is completely different than file-based malware in terms of how the malicious code is executed and how it dodges traditional file-scanning technologies.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Is Your “Father’s IAM” Putting You at Risk?

October 13, 2017 Added by:Jackson Shaw

Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and that you can prove that all the access is right.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

The Weakest Link In Banking Security – ATMs

October 03, 2017 Added by:Vanishree Rao

We have recently seen the weak link theory play out with the very familiar Automated Teller Machines (ATMs) that are used regularly around the globe.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »