Infosec Island

D36d0936f0c839be7bf2b20d59eaa76d

Securing the Internet of Things (IoT) in Today's Connected Society

November 19, 2019 Added by:Steve Durbin

The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.

Comments  (0)

49319ce2596a7e7bfb0ef825a9e5ea50

What Is Next Generation SIEM? 8 Things to Look For

November 14, 2019 Added by:Avi Chesla

Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Cybersecurity and Online Trading: An Overview

October 25, 2019 Added by:Sam Bocetta

Take a look at how and why the risks of international trade are increasing, and the political response to this.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Artificial Intelligence: The Next Frontier in Information Security

October 23, 2019 Added by:Steve Durbin

The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security.

Comments  (0)

Ff19c51d0400a9d7c1c7bb44749741cf

Five Main Differences between SIEM and UEBA

October 23, 2019 Added by:Nilesh Dherange

Five ways in which SIEM and UEBA technology differs.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Human-Centered Security: What It Means for Your Organization

September 24, 2019 Added by:Steve Durbin

Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29, 2019 Added by:Steve Durbin

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.

Comments  (0)

019f0bfa701317d0e838d7bb01218770

Top Three Cross-Site Scripting Attacks You Need to Know Now

July 31, 2019 Added by:Johnny Rice

Cross-Site scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users.

Comments  (0)

2bbe09d8431465f396a98305e7a1c5a6

What Call Center Fraud Can Teach Us about Insider Threats

July 22, 2019 Added by:Saryu Nayyar

Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cybersecurity: Drones Will Soon Become Both Predator and Prey

July 19, 2019 Added by:Steve Durbin

Like other IoT devices, drones currently have very poor security controls, making them vulnerable to hijacking.

Comments  (0)

2de88989281faa7581932957d89e74d2

The Automotive Industry: Stepping up on Defense

July 19, 2019 Added by:David Barzilai

As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure

June 04, 2019 Added by:Steve Durbin

Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware.

Comments  (0)

B6749cd99f8cb495abe4ed3508a31c08

Thoughts on DoS Attack on US Electric Utility

June 04, 2019 Added by:Phil Neray

The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.

Comments  (0)

46208e1048c9421f04baab5dc8814df3

Answering Tough Questions About Network Metadata and Zeek

May 08, 2019 Added by:Kevin Sheu

As security operations teams search for the best threat data to analyze in their data lakes, network metadata often lands in the category of being just right.

Comments  (0)

404b3b611dd8d2186d07c3a74d2fb4da

SOAR: Doing More with Less

April 26, 2019 Added by:Michele Zambelli

Implementing an SOAR model can provide the glue to make this security intelligence actionable using repeatable processes for faster incident response that does not require adding more resources.

Comments  (0)

408ac1e5b2b05b63e650bd356018b62c

Gaining Control of Security and Privacy to Protect IoT Data

April 24, 2019 Added by:Mike Nelson

It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »