Security Training

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment

December 11, 2017 Added by:Perry Carpenter

As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?

Comments  (0)

Abd50ba6fa1aff83aff411c963b09ab5

Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job

December 11, 2017 Added by:Tim Critchley

A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

From the Medicine Cabinet to the Data Center – Snooping Is Still Snooping

November 03, 2017 Added by:Jackson Shaw

A global survey revealed a lot of eye-opening facts about people’s snooping habits on their company’s network.

Comments  (0)

F3828ca8c8a9ac7e4fc6a5cc12f52066

Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification

October 13, 2017 Added by:Bogdan Botezatu

Fileless malware is completely different than file-based malware in terms of how the malicious code is executed and how it dodges traditional file-scanning technologies.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

Cyber Security in the Workplace Is Everyone’s Obligation

October 11, 2017 Added by:Joseph Carson

Cyber security is no longer just a technology challenge—it’s a test for everybody who uses and interacts with technology daily. That means: everyone in your organization.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security Awareness: Watch-Out for Hurricane Harvey Online Scams

August 28, 2017 Added by:Dan Lohrmann

As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...

Comments  (0)

Bab14cc7bc9284548bf8b5c91ec19990

How Businesses Can Bolster Security and Stop Attacks Before they Happen

August 01, 2017 Added by:Chris Schueler

Organizations will have to realize that in-house efforts often won’t be enough when fighting off hackers with attacks they’ve sourced from around the world.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

The Security Risk Within Smart Cities

June 30, 2017 Added by:Mirko Brandner

Smart cities offer great opportunities and, in terms of IoT innovations security, data protection and privacy have to be top priority if they should be profitable in the long run.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past

March 09, 2017 Added by:Scott Schneider

Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part Two — Best Practices

March 02, 2017 Added by:Logan Kipp

By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

The Dark Side of the Force: Hacktivism Takes Center Stage in 2016

December 21, 2016 Added by:Dan Lohrmann

A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.

Comments  (0)

Ee5f058b283cdc6dba84464d453801d7

Decrypting the Gender Imbalance: Hiring Women in Cybersecurity

December 09, 2016 Added by:Michelle Johnson Cobb

Organizations that seek to achieve greater representation of women in their IT security teams should maintain a steady, multi-faceted approach to recruitment — and continually evaluate their performance in terms of the advancement and retention of women in this area.

Comments  (0)

8abfe8ac9ec214d68541fcb888c0b4c3

Norton Cyber Security Insights Report - November 2016

November 17, 2016 Added by:Peter Buttler

A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »