Blog Posts Tagged with "Security Awareness"
The Five Secrets to Making Security Awareness Work in 2018
January 29, 2018 Added by:Perry Carpenter
Are you ready to make 2018 a break-out year for your security awareness program?
Comments (0)
#NCSAM: Third-Party Risk Management is Everyone’s Business
October 17, 2017 Added by:Scott Schneider
This post explores one of the weekly themes for National Cyber Security Awareness Month, “Cybersecurity in the Workplace is Everyone’s Business.”
Comments (0)
Cyber Security in the Workplace Is Everyone’s Obligation
October 11, 2017 Added by:Joseph Carson
Cyber security is no longer just a technology challenge—it’s a test for everybody who uses and interacts with technology daily. That means: everyone in your organization.
Comments (0)
The 4 Cs of Automated Incident Response
December 06, 2016 Added by:Nathan Burke
We’re currently in a phase in security where there are an ever-expanding number of automated incident response solutions, and no standard method for judging quality or value.
Comments (0)
Security vs. Privacy: Securing Your Critical Information Assets
November 17, 2016 Added by:Steve Durbin
Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.
Comments (0)
Five Rules to Conduct a Successful Cybersecurity RFP
February 16, 2016 Added by:Ilia Kolochenko
It becomes more and more difficult to distinguish genuine security companies, with solid in-house technologies, and experts with flashy marketing and FUD (Fear, Uncertainty, Doubt) tactics. This makes the process of cybersecurity RFP (Request For Proposal) more complicated and challenging for organizations of all sizes.
Comments (0)
5 Solid Ways to Build Security Culture in Your Organization (That You Probably Never Heard Of)
January 22, 2014 Added by:Pete Herzog
Teach employees not to say no. This and 4 other unconventional tricks will build or enhance your organization's security culture.
Comments (2)
How Do I Measure the Success of a Training Program?
November 19, 2013 Added by:Rohit Sethi
An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article introduces a concept recommended by NIST in their Special Publication 800-16, for evaluating training effectiveness.
Comments (0)
Bore Them With Death-by-Awareness: That’ll Teach em!
May 08, 2013 Added by:Lee Mangold
As security professionals, we have to understand that not everyone has a passion for security. In fact, most people don’t. Given that we know “they” don’t share our passion, and we know they are the most vulnerable attack vector, why do we continue to bore them with homogenous and irrelevant training?
Comments (0)
Security Awareness: To Train or Not to Train?
April 08, 2013 Added by:Le Grecs
It's up for each organization to monitor their threats and weaknesses and use the appropriate set of controls to minimize their risk to an acceptable level. Perhaps security awareness is part of that ... perhaps it is not.
Comments (0)
Security Resolutions for the New Year
December 28, 2012 Added by:Allan Pratt, MBA
As the New Year approaches, have you thought about your New Year’s resolutions? As a member of the information security industry, I would like to share five resolutions that you should definitely add to your list...
Comments (0)
Closing the Vault Door
December 18, 2012 Added by:Suzanne Widup
For those of you who have appreciated The Leaking Vault series of data breach reports, I have some sad news. As I was days away from releasing the third installment, I received an email from Brian Martin with the Open Security Foundation stating that I do not have permission to use their data without a license...
Comments (4)
The INFOSEC Naughty List 2012: “The Twelve Charlatans of Christmas” Edition
December 12, 2012 Added by:Infosec Island Admin
But seriously folks, this post may be cathartic for me and a chuckle for you, but in reality it will change nothing. The douches will be douchey and the charlatans will sell their cyber snake oils. Enjoy the charlatanism and douchery...
Comments (0)
Reflected Glory: Revealing one of my self-created social engineering tricks
December 11, 2012 Added by:Will Tarkington
What is reflected glory? To do this trick you need someone with a high social status that you can be associated with. It doesn’t have to be a close association just one that is known. You then simply state with authority your own opinion once the relationship has been recently established...
Comments (0)
Lack of Security in Android Apps? That Could Be
December 02, 2012 Added by:Keith Mendoza
Have you ever installed an app in your Android phone and when you got to the permission screen you just couldn't justify to yourself why an app would require the permissions it's asking for?
Comments (0)
Convenience vs. Security - Why convenience keeps winning
November 26, 2012 Added by:Rafal Los
Convenience wins in the consumer mind, easily. Even in the mind of someone who's security-minded convenience may win out over a little added risk. This is especially true if the card issuers are willing to take on the risk at the anticipation of higher revenue or profit...
Comments (0)
- The Rise of Ransomware and the Consequences for SMBs
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them