Security Awareness

Ac61693522e1c081485f696ae6a5fb4b

4 Cybersecurity Tips for Staying Safe During the World Cup

June 13, 2018 Added by:Joseph Carson

As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup.

Comments  (0)

0a36f423b9a230eb25d9f024fb71c03c

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

June 13, 2018 Added by:Guy Caspi

To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Building a Strong, Intentional and Sustainable Security Culture

June 10, 2018 Added by:Perry Carpenter

By understanding the attributes of organizational culture, leaders can make informed choices when trying to change cultures and improve an organization’s overall defense.

Comments  (0)

Dfb05b2df86265de8900aa5aadd6d685

Infrastructure Under Attack

May 31, 2018 Added by:Tom Bienkowski

Any organization that delivers services over the web needs strong, purpose-built DDoS protection.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

How to Prevent Cloud Configuration Errors

May 29, 2018 Added by:Reuven Harrison

With unified visibility into the whole network, at all levels, IT managers will be able to strike a balance between security and functionality.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding the Role of Multi-Stage Detection in a Layered Defense

May 08, 2018 Added by:Liviu Arsene

It’s important to understand that the increased sophistication of threats requires security technologies capable of covering multiple stages of attack.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

PyRoMine Malware Sets Security Industry on Fire

May 03, 2018 Added by:Boris Vaynberg

Despite all the investments in cyber protection and prevention technology, it seems that the cyber terrorist’s best tool is nothing more than variations on previous exploits.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Avoiding Holes in Your AWS Buckets

April 12, 2018 Added by:Sanjay Kalra

Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.

Comments  (0)

809e5bf42b3c61540fdf08a772a9d960

The Three Great Threats to Modern Civilization

April 12, 2018 Added by:Jessica Lavery

There are three main threats to our modern civilization that could cause humanity to go the way of the ancient Mayans.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

2020 Vision: How to Prepare for the Future of Information Security Threats

April 06, 2018 Added by:Steve Durbin

A highlight of the top nine threats to information security over the next two years.

Comments  (0)

1a097da944042b7ffb4af15523c405ba

Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus

April 03, 2018 Added by:Mike McKee

DLP appears to be following in the footsteps of another once-ubiquitous but now outdated technology: anti-virus.

Comments  (0)

3cf030edb83351856102235bcee85613

Unconventional Thinking — Four Practices to Help Mitigate Risk

April 02, 2018 Added by:Sanjay Ramnath

Organizations must proactively assess their security posture and focus on mitigating risk with unconventional approaches to achieve true security and reduction of successful cyber events.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

The Night the Lights Went out in Georgia (Almost)

March 29, 2018 Added by:Ben Carr

The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.

Comments  (0)

F93757731f02bb253ed824020ef2cf6e

Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed

March 26, 2018 Added by:David Pearson

Context is everything: connecting the dots between indicators of interesting activity across different aspects of an environment is the way to provide unparalleled alert fidelity.

Comments  (0)

21a45a9d0545830392fdf2b51c4d8c54

4 Ways Every Employee Can Play a Role in Their Company’s Security

March 23, 2018 Added by:Tomáš Honzák

Employees can help a company avoid catastrophic data breaches and protect their own personal data more effectively.

Comments  (0)

A4c42684a8889958a83ecca5d2fe59e5

The Soaring Success of Cybercrime as a Company

March 22, 2018 Added by:A. N. Ananth

In a raging cyber war, it pays to think like cybercriminals and understand how they are organizing and operating as corporations. While enterprises won’t resort to cybercrime, we need to understand, outthink and outplay our adversaries at a strategic, not just tactical, level.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »