How to avoid being the next Yahoo
It’s no longer about whether or not you’ll get attacked, it’s about knowing what the repercussions are and if you have the right controls to minimize or completely eliminate the fallout. In order to be...
View ArticleWhat these CSOs did on their first days
There are a million things to worry about but these chief security officers provide advice on how to start off on the right foot.
View ArticleWhat 2017 has in store for cybersecurity
There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation’s next president will do. Find out what...
View ArticleRansomworm: the next level of cybersecurity nastiness
As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.
View ArticleWill the cloud be a safe haven for data in 2017?
Experts offer differing opinions on where cloud security is headed.
View ArticleHow vulnerable are you behind the wheel of your connected car?
Remember when all you had to worry about with your car is getting an oil change every 3,000 miles. Today’s connected cars are miles ahead technologically speaking of those “dumb” vehicles, but drivers...
View ArticleUsers take the cheese to solve data breaches
Verizon releases its annual breach report that puts the reader in the driver's seat.
View ArticleAre you afraid your car will be taken over?
A consortium was recently created to make sure that your car stays on the road and in your control.
View ArticleHas fraud met its match?
New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with...
View ArticleStudy finds devices are not wiped properly
The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.
View ArticleWhat home products are most susceptible to cyber burglars?
In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact...
View ArticleUsers have little confidence their company can protect their mobile device
A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?
View ArticleA day in the life of a threat researcher
After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.
View ArticleKentucky workers comp carrier survives ransomware
An overzealous Web surfer brings employee training to the forefront. See how they have tightened up the network.
View ArticleThe top 5 mobile security threats
When mixing personal and professional tasks on your smartphone, it's inevitable that someone is going to accidentally stumble onto malware. The SANS Institute's Chris Crowley has some advice on how to...
View Article
More Pages to Explore .....