Infosec Island
Deceptioneering: Exploring How Humans Are Wired for Deception
September 23, 2017 Added by:Perry Carpenter
No matter how much security technology we purchase, we still face a fundamental security problem: people. They are both our biggest threat and they serve as our last line of defense.
Comments (0)
Enterprise Security in the Age of Advanced Threats
September 05, 2017 Added by:Eric Polet
What does an advanced cyber-security solution need to look like for enterprises in 2018 and beyond?
Comments (0)
Security Awareness: Watch-Out for Hurricane Harvey Online Scams
August 28, 2017 Added by:Dan Lohrmann
As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...
Comments (0)
Why the GDPR is Important to Your Organization
August 14, 2017 Added by:Steve Durbin
The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.
Comments (0)
How to Choose the Right Data Protection Strategy
August 02, 2017 Added by:Dave Packer
A deep dive on data protection solutions and how they fit unique needs.
Comments (0)
Social Security Administration’s Second Attempt at 2FA Fails Federal Government’s Own Standards, Not Secure
June 06, 2017 Added by:Alexandre Cagnoni
The Social Security Administration (SSA) recently instituted its latest precautions to identify threats and protect citizens’ information by making two-factor authentication mandatory for all users.
Comments (0)
Bracing for the Future of Information Security Threats
April 04, 2017 Added by:Steve Durbin
New attacks will impact both business reputation and shareholder value, and cyber risk exists in every aspect of the enterprise. Here are the top nine threats to information security over the next two years.
Comments (0)
Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past
March 09, 2017 Added by:Scott Schneider
Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.
Comments (0)
The Dark Side of the Force: Hacktivism Takes Center Stage in 2016
December 21, 2016 Added by:Dan Lohrmann
A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.
Comments (0)
Top 10 Cloud and Security Predictions for 2017
December 14, 2016 Added by:Shehzad Merchant
In the coming year, we might see a number of significant changes with respect to both the public cloud and information security.
Comments (0)
Minimize “Dwell Time” to Cut the Cost of Data Center Breaches
October 20, 2016 Added by:Dave Burton
If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.
Comments (0)
Paving the Road to Digital Transformation
August 18, 2016 Added by:Jackson Shaw
Digital transformation has arrived and organizations are embracing the latest innovations to provide customers with anytime, anywhere, any way access.
Comments (0)
Black Hat, DEFCON and the Summer of Our Discontent
July 21, 2016 Added by:Paul Shomo
I see wisdom behind the instinct to resist information authority. Human hierarchy tends to pyramid into increasingly fewer numbers up top. If you're going to fight for rights, there are more individuals at the bottom and more power to abuse from above.
Comments (0)
Microsoft Blocks Certain Passwords
June 10, 2016 Added by:Dean Wiech
The steps Microsoft is making are definitely a move in the right direction to protect users from potential social hacking with easily guessable passwords.
Comments (0)
Cloud Security Can’t Be Ignored Anymore, Thanks to Millennials
May 09, 2016 Added by:Vanishree Rao
Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.
Comments (0)
Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?
April 26, 2016 Added by:Jim Legg
While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization