Blog Posts Tagged with "Threats"

F5a99fda189e83ed3f4ce79415910cee

The Security Risk Within Smart Cities

June 30, 2017 Added by:Mirko Brandner

Smart cities offer great opportunities and, in terms of IoT innovations security, data protection and privacy have to be top priority if they should be profitable in the long run.

Comments  (0)

E3fc80dfc564927d51a4d7320b45d6fa

Survey Shows Employers under Pressure to Keep Mobile Workers Safe

June 30, 2017 Added by:Vincent Geffray

According to a new report from Everbridge, 77% of employers said their employees would prioritize safety over privacy concerns when it comes to identifying their location during a critical event.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Stop Doing Four Things—and Convince Your Execs and Board to Properly Fund Cybersecurity

March 28, 2017 Added by:Kevin Magee

If you want to convince your execs and board to properly fund cybersecurity, stop telling them scary stories and using Hollywood clichés to make your case.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

7 Security Threats You May Have Overlooked

November 11, 2014 Added by:Patrick Oliver Graf

In today’s business environment, the list of overlooked network security threats is endless. Information security professionals are modern-day gladiators, tasked with defending corporate data and networks against both known and unknown threats, but no matter how skilled they are, there will always be new threats to their networks.

Comments  (1)

766e428d1e232bbdd58664b41346196c

Poisoning the Well: Why Malvertising is an Enterprise Security Problem

September 18, 2014 Added by:Elias Manousos

While customers won’t know or care which ad network delivered a malicious ad, they will blame the organization that owns the website or placed the ad that attacked them.

Comments  (2)

798062984af63011823d48fef7863cd8

What to do When Traditional Security Isn’t Enough

June 25, 2013 Added by:Paul Lipman

Relying on traditional security measures to catch the bad guy in action or prevent being the victim of a breach doesn’t cut it in today’s threat landscape, and IT teams don’t have the time and resources to address each threat vector in isolation, nor should they have to.

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Intelligence for the Enterprise - Part 1

June 17, 2013 Added by:Rafal Los

Security Intelligence. This topic seems to come up over and over in discussions with enterprise security leaders, security professionals, writers, and pundits. There are many different facets to the topic, but ultimately what are we talking about?

Comments  (0)

36317a78f97d1d6d7a02333ad01186fa

New Approaches for Blocking Zero-Day Exploits to Prevent APTs

April 16, 2013 Added by:George Tubin

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. An endpoint protection approach that provides both effectiveness and manageability must begin with an understanding of the attack vectors that require mitigation.

Comments  (2)

Default-avatar

Resource: Defeating Advanced Persistent Threat Malware

January 29, 2013 Added by:Infosec Island

Attacks can come from anywhere. Even more daunting is that not all malware is alike. Learn about battling advanced threats and the progressive strategies to battle malware from this new white paper.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Sophos Security Threat Report 2013, today... tomorrow

December 07, 2012 Added by:Pierluigi Paganini

Sophos was one of the first security firms that has published a report on the security landscape the upcoming year. The document provides an interesting overview on most common and dangerous cyber threats to determine the level of penetration in different countries...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

"No known exploits in the wild..."

November 13, 2012 Added by:Rafal Los

It's human nature, and just the way we are wired... I know I can feel some of that on myself when I hear that phrase. I guess I would change it to be slightly more effective (or harder to dismiss) by adding "at this time" at the end of the sentence - although I doubt it would make too much of a different...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

Steganography: Hiding In Plain Sight

October 18, 2012 Added by:Alan Woodward

I recently wrote a piece for the BBC in which I tried to explain why steganography (as opposed to cryptography) posed a threat. Or least it might. The trouble is we don't really know, and the default position has been to assume that because we haven't discovered it being used en masse the threat is negligible...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Malicious Websites: The Web is a Dangerous Place

September 25, 2012 Added by:Robert Siciliano

McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that by just simply visiting a website you could be exposed to malicious things that can do harm to your computer, mobile device, finances or identity...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

CleanIT Project: concerns for a Global Surveillance Project

September 23, 2012 Added by:Pierluigi Paganini

I just returned from the Cyber Threat Summit in Dublin, The event revealed an alarming scenario on cyber threats, no matter if it is cybercrime, hacktivism, cyber terrorism or cyber warfare, all those share a worrying growth of attacks that are influencing our digital lives...

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

What Exactly is Internet Safety Anyhow?

September 23, 2012 Added by:Theresa Payton

What does Internet safety mean to the average person? It may vary depending upon age, how you use the internet, and the type of work that you do that involves the digital world. Here are some sobering statistics that might give you a perspective...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask the Experts: Management and Rational Decisions About Security

September 22, 2012 Added by:Brent Huston

Emphasize that there are security measures that are effective in zero day situations. These include such controls as anomaly based detection mechanisms, system user security training, and incident response programs. If you can detect these attacks early and respond to them correctly...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »