Infosecurity Blogs
The Overlooked Elements of InfoSec: Solving the Unknown Unknowns
If there’s a golden rule around InfoSec, it probably amounts to “you have to know what exists on your network to effectively protect it.”
How Information Resilience can Help Businesses Secure Their Place in Tomorrow’s Supply Chain
The proper protection of a business’ digital information is a growing concern, and one that must be addressed to ensure the long-term prosperity of an organization.
Why Preventing Rooting and Jailbreaking is so Important
Although rooting and jailbreaking are technically different processes on different platforms, the end-goal is the same.
Why Employees Are Taxing Your Cyber Security Team’s Patience
Tax season shouldn’t put an undue burden on the IT team.
IT Untethered – How Wireless is Changing the World
Wi-Fi started out as way to make local area networks easier to deploy. Now, coupled with cellular networks, the rise ubiquitous mobility and the IoT, wireless is changing the world and there are security issues to consider.
Securing the Connected Organization
Victoria Windsor, Content Manager for Infosecurity Europe, looks at the challenges businesses face to secure their connected enterprise in 2016
Why Data Leaks Will Continue to Happen
The release of sensitive information to the public by individuals who are sometimes called whistleblowers and dubbed traitor or hero, is termed to be a data leak.
How to Run Effective Phishing Assessment and Training Campaigns Employees Don’t Hate
The 11 best ways to conduct a successful phishing assessment process.
#MayThe4thBeWithYou : The Insider Threat Awakens
Spoiler alert: If you are one of the few people in the galaxy who haven’t seen the movie yet, you may want to hold off on reading this.
We Cannot Fight DDoS Attacks With Our Eyes Closed
When dealing with a DDoS attack, it can be challenging to determine whether your website is down due to legitimate traffic volumes or because of an attack. Unfortunately, businesses are unable to simply check to see if all the traffic is coming from one IP address because of the nature of DDoS attacks whereby traffic comes from multiple sources.
Five Recommendations for Smarter Security Operations
The impact of smarter resource allocation will continue to be a major factor for the cyber security function as the gap between supply of talent and the demand for more mature programs grows.
Fighting Account Takeovers with Cloud Intelligence
From a defensive point of view, examining a single transaction initiated with stolen credentials to a single web application will return an inconclusive insight, so therefore taking preventive action on that transaction becomes a risky decision.
Give Your System a Security Checkup
You need to do a regular (preferably quarterly) cybersecurity checkup that handles every aspect of your network and system.
Fighting Account Takeovers with Cloud Intelligence
Visitors to highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.
Testing Anti-Malware Support
Product support - a less-frequently tested aspect of security.
The Cloud is the New 'Third Place', but Security Needs to Keep Pace
If we are going to really reap the benefits of the cloud as a 'third space' its security has to be improved.
User and Entity Behavior Analytics is Just One Piece of the Insider Threat Puzzle
User and entity behavior analytics (UEBA) has quickly become a crowded space. CISOs are overwhelmed by vendors promising UEBA as the key to combatting insider threats when in reality it’s “a” key not “the” key.
Your Money or Your Data? Mitigating Ransomware with Dropbox
Ransomware is designed to scare you into parting with money to avoid losing your data; there is no reason that either should happen. Traditional anti-virus and cloud storage services such as Dropbox form part of an effective mitigation strategy.
What Apple Vs. The FBI Can Teach Us About Cloud Storage Security
The recent Apple vs. FBI debate hit close to home for the cloud community because it touched on one of the industry’s hottest topics: data security.
Five Ways to Improve Security and Increase Collaboration
With mass migration from business in brick-and-mortar to the ‘wild’ World Wide Web, there are bound to be some growing pains.