Friday, 26 December 2014
TechSecurity: 23 Best Practices for Cloud Security
TechSecurity: 23 Best Practices for Cloud Security: Preparing for cloud security is no longer a luxury, but rather a standard procedure. First, you should consider and understand the three mo...
23 Best Practices for Cloud Security
Preparing for cloud security is no longer a luxury, but rather a standard procedure. First, you should consider and understand the three models of cloud computing: infrastructure-as-a-service (IaaS),....
Friday, 5 December 2014
Thursday, 4 December 2014
Wednesday, 26 November 2014
Thursday, 13 November 2014
Cisco warns of shortage in security professionals to fight online criminals
The Cisco 2014 Annual Security Report reveals that threats
designed to take advantage of users’ trust in systems, applications and
personal networks have reached startling levels. The report indicates a
shortage of more than a million security professionals across the globe in
2014.
The sophistication of the technology and tactics used by
online criminals have outpaced the
Saturday, 20 September 2014
Wednesday, 17 September 2014
Tuesday, 9 September 2014
Friday, 5 September 2014
Thursday, 14 August 2014
Cyber-Security Threats Rise in Frequency, Complexity
All types of organizations are at risk of being targeted, but financial
institutions top the list of the most at-risk businesses, Trend Micro found.
Cyber-threats, data breaches and high-risk
vulnerabilities have continued to dominate the first half of 2014, with attacks
affecting consumer’s personal information, included theft of data such as
customer names, passwords, email addresses, home addresses, phone numbers, and
dates of birth, according to a report from Trend Micro.
The data breaches and Distributed Denial of Service
(DDoS) attacks recorded this quarter showed that an organization-wide strategy
is required if companies wish to survive their aftermath.
Monday, 11 August 2014
Friday, 8 August 2014
Monday, 21 July 2014
Wednesday, 2 July 2014
Monday, 30 June 2014
How to build trust between business and IT
One of the biggest
challenges we face with securing our networks and systems is that many
businesses view cyber security as an IT problem and not a business problem.
However, when you consider how dependent businesses are on IT and, more
importantly, on the information on those systems, it’s obvious that businesses
need to realize cyber security really is a business issue. As information
security professionals we need to realize that helping business leaders
understand the threats posed by cyber security is a challenge
Wednesday, 25 June 2014
Tuesday, 17 June 2014
Monday, 9 June 2014
Monday, 26 May 2014
Tuesday, 20 May 2014
Sunday, 18 May 2014
Friday, 16 May 2014
If mother nature was a CISO: What the animal kingdom can teach us about IT security
If mother nature was a CISO: What the animal kingdom
can teach us about IT security
21
People often describe the Internet as a
hostile network — which is true — and that got me thinking about other hostile
environments where a successful strategy results in resiliency and continuity.
What if Mother Nature was the CISO? What would her strategy be? What strategy
could she give the prey species so they could survive in the presence of many
predators?
Albert Einstein was quoted as saying,
“Look deep into nature, and then
Friday, 9 May 2014
Thursday, 8 May 2014
Wednesday, 7 May 2014
Tuesday, 6 May 2014
Wednesday, 30 April 2014
Tuesday, 22 April 2014
Thursday, 17 April 2014
Friday, 11 April 2014
'Heartbleed' computer bug threat spreads to firewalls and beyond
(Reuters) - Hackers could crack email systems,
security firewalls and possibly mobile phones through the
"Heartbleed" computer bug, according to security experts who warned
on Thursday that the risks extended beyond just Internet Web servers.
The
widespread bug surfaced late on Monday, when it was disclosed that a pernicious
flaw in a widely used Web encryption program known as OpenSSL opened hundreds
of thousands of websites
Monday, 7 April 2014
Friday, 28 March 2014
Saturday, 22 March 2014
Friday, 21 March 2014
Friday, 7 March 2014
New studies confirm IT security vulnerabilities
Just as we get word that giant retailer Target is completely reorganizing
its IT security program in the wake of its massive data breach, two more
security studies confirm the vulnerabilities that many organizations face.
In an email to FierceCIO, security firm SailPoint shared the
results of its most recent study on how enterprises are embracing and in many
cases mandating the use of cloud and mobile, and thereby
Monday, 3 March 2014
Saturday, 1 March 2014
Thursday, 20 February 2014
Thursday, 13 February 2014
Wednesday, 12 February 2014
Thursday, 6 February 2014
Tuesday, 4 February 2014
Monday, 27 January 2014
Thursday, 23 January 2014
Wednesday, 22 January 2014
Tuesday, 21 January 2014
Wednesday, 15 January 2014
Wednesday, 8 January 2014
Subscribe to:
Posts (Atom)