Infosec Island

8259d904d48c0e93d3edf9383230de4c

Enterprise Security in the Age of Advanced Threats

September 05, 2017 Added by:Luis Corrons

What does an advanced cyber-security solution need to look like for enterprises in 2018 and beyond?

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security Awareness: Watch-Out for Hurricane Harvey Online Scams

August 28, 2017 Added by:Dan Lohrmann

As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)

02fe982eecea0dda30ffa3657a08097b

How to Choose the Right Data Protection Strategy

August 02, 2017 Added by:Dave Packer

A deep dive on data protection solutions and how they fit unique needs.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Social Security Administration’s Second Attempt at 2FA Fails Federal Government’s Own Standards, Not Secure

June 06, 2017 Added by:Alexandre Cagnoni

The Social Security Administration (SSA) recently instituted its latest precautions to identify threats and protect citizens’ information by making two-factor authentication mandatory for all users.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Bracing for the Future of Information Security Threats

April 04, 2017 Added by:Steve Durbin

New attacks will impact both business reputation and shareholder value, and cyber risk exists in every aspect of the enterprise. Here are the top nine threats to information security over the next two years.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past

March 09, 2017 Added by:Scott Schneider

Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

The Dark Side of the Force: Hacktivism Takes Center Stage in 2016

December 21, 2016 Added by:Dan Lohrmann

A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.

Comments  (0)

E61bd0e5d76b76868ffe7b6574f67796

Top 10 Cloud and Security Predictions for 2017

December 14, 2016 Added by:Shehzad Merchant

In the coming year, we might see a number of significant changes with respect to both the public cloud and information security.

Comments  (0)

2271632958e3e89d01a458efe5e003bd

Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)

0403c88fd155b90c9d994434a8360e67

Paving the Road to Digital Transformation

August 18, 2016 Added by:Jackson Shaw

Digital transformation has arrived and organizations are embracing the latest innovations to provide customers with anytime, anywhere, any way access.

Comments  (0)

8e45a76b01e10a6a710858234986963e

Black Hat, DEFCON and the Summer of Our Discontent

July 21, 2016 Added by:Paul Shomo

I see wisdom behind the instinct to resist information authority. Human hierarchy tends to pyramid into increasingly fewer numbers up top. If you're going to fight for rights, there are more individuals at the bottom and more power to abuse from above.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Microsoft Blocks Certain Passwords

June 10, 2016 Added by:Dean Wiech

The steps Microsoft is making are definitely a move in the right direction to protect users from potential social hacking with easily guessable passwords.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Cloud Security Can’t Be Ignored Anymore, Thanks to Millennials

May 09, 2016 Added by:Vanishree Rao

Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.

Comments  (0)

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Insider Threats in Today's Digital Age

April 05, 2016 Added by:Steve Durbin

Most research on the insider threat focuses on malicious behavior. However, insider negligence and insider accidents comprise a greater and growing proportion of information security incidents. Chief Information Security Officers (CISOs) who limit their thinking to malicious insiders may be gravely miscalculating the risk.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »