Blog Posts Tagged with "cybersecurity"

760f8b3ac86e3ac286c6e0d4bdd9a039

Lessons from Cyber Essentials – Going Back to the Basics

October 11, 2018 Added by:Andrew Avanessian

IT leaders across all organisations should be working to weave in the Cyber Essentials scheme into the fabric of their businesses.

Comments  (0)

0fd0758565844dd411fbfb4600a7b981

Could a Credit-Like Security Score Save the Cyber Insurance Industry?

October 11, 2018 Added by:Joseph Kucic

Enterprises need access to cyber insurance that accurately reflects their current security posture and that covers both direct and indirect expenses.

Comments  (0)

1a097da944042b7ffb4af15523c405ba

Embracing Cybersecurity Best Practices, No Matter Where You Are

October 05, 2018 Added by:Mike McKee

Much like your physical health, there is no way to guarantee cyber health.

Comments  (0)

Ea119a40c1592979f51819b0bd38d39d

Are Colleges Teaching Real-World Cyber Security Skills?

September 25, 2018 Added by:Adi Sua

The real challenge of the cybersecurity skill shortage is making sure new recruits are prepared for the real world.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The Importance and Requirements of Privileged Access Management

August 30, 2018 Added by:Joseph Carson

The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.

Comments  (0)

3013a8d01542d3101f0a905ab013f00a

All Data is Security Data: A Shift in Thinking

August 30, 2018 Added by:Chris Jordan

Reviewing the data used in security operations shows that all data, not just security logs, are needed to operate efficiently.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Building a Strong, Intentional and Sustainable Security Culture

June 10, 2018 Added by:Perry Carpenter

By understanding the attributes of organizational culture, leaders can make informed choices when trying to change cultures and improve an organization’s overall defense.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

2020 Vision: How to Prepare for the Future of Information Security Threats

April 06, 2018 Added by:Steve Durbin

A highlight of the top nine threats to information security over the next two years.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

The Night the Lights Went out in Georgia (Almost)

March 29, 2018 Added by:Ben Carr

The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.

Comments  (0)

E8643ec2aea49d246d020cf412aa5d05

Is Blockchain Really Disruptive in Terms of Data Security?

March 26, 2018 Added by:Mary Callahan

Blockchain can provide transparency, decentralization, efficiency, security, and other benefits, revolutionizing multiple industries.

Comments  (0)

F93757731f02bb253ed824020ef2cf6e

Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed

March 26, 2018 Added by:David Pearson

Context is everything: connecting the dots between indicators of interesting activity across different aspects of an environment is the way to provide unparalleled alert fidelity.

Comments  (0)

0da151db886b8b40e0a1d051485bedd3

An Open Letter to AWS CEO Andy Jassy on Cloud Security Innovation

March 16, 2018 Added by:Brian Ahern

Brian Ahern, CEO & Chairman of Threat Stack, writes an open letter to Amazon Web Services CEO Andy Jassy.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment

December 11, 2017 Added by:Perry Carpenter

As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Deceptioneering: Exploring How Humans Are Wired for Deception

September 23, 2017 Added by:Perry Carpenter

No matter how much security technology we purchase, we still face a fundamental security problem: people. They are both our biggest threat and they serve as our last line of defense.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

NIST Offering Much Needed Guidance for Neglected SMBs

August 11, 2017 Added by:Avi Bartov

The NIST framework provides the much-needed guidance that organizations of any size can use to identify their major risks in cyberspace.

Comments  (0)

D47338e40e87fbbb10a052dd9c98ac89

Enterprises: Can You Handle 3,680 Phishing Emails per Week?

August 08, 2017 Added by:Kevin O'Brien

As the number of Business Email Compromise scams continues to grow, understanding whether a specific message is an attack requires fully integrated threat intelligence.

Comments  (0)

Page « < 1 - 2 - 3 > »