Security Management

211571f3e14099fd9a6c172426982ca5

Changing Security Behaviors Via a Top Down Approach

August 02, 2018 Added by:Perry Carpenter

When it comes to changing behaviors and building better security hygiene, the role of the leader is not only critical, but it is the impetus to change.

Comments  (0)

23cdc45f8cc85a3009e56cf5bd89a095

Plug Your Cloud Cybersecurity Holes

July 26, 2018 Added by:Marie Hattar

Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?

July 26, 2018 Added by:James Lee

Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Memory Protection beyond the Endpoint

July 16, 2018 Added by:Liviu Arsene

Re-engineering security solutions to fit the new infrastructure, performance, and scalability needs of organizations is crucial as advanced threats often exploit security blind spots.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Intent Based Networking: Turning Intentions into Reality

July 16, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems

July 03, 2018 Added by:Steve Durbin

In the face of mounting global threats, organization must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Navigating Dangerous Waters: the Maritime Industry’s New Cybersecurity Threat as Technology Innovation Grows

July 03, 2018 Added by:Jalal Bouhdada

Here is how the maritime industry can overcome cybersecurity challenges to enter the next generation of shipping.

Comments  (0)

E51e95052d67c3df896465b1249e9432

Is User Training the Weakest Link for Your Email Security Approach?

June 28, 2018 Added by:Dennis Dillman

Security training and awareness should be at the top of your layered security strategy to ensure your employees are less of a liability, and the risk of a breach is significantly lower.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Least Privilege Access – Still at the Front Lines of Security

June 27, 2018 Added by:Jackson Shaw

The principle of least privilege is a critical component to any effective privileged access management program, but it is not the only principle.

Comments  (0)

D47111ebac9e529cc7e382f0f095f32b

"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening

June 27, 2018 Added by:Jeannie Warner

In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Every Business Can Have Visibility into Advanced and Sophisticated Attacks

June 18, 2018 Added by:Liviu Arsene

Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

4 Cybersecurity Tips for Staying Safe During the World Cup

June 13, 2018 Added by:Joseph Carson

As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup.

Comments  (0)

0a36f423b9a230eb25d9f024fb71c03c

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

June 13, 2018 Added by:Guy Caspi

To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Building a Strong, Intentional and Sustainable Security Culture

June 10, 2018 Added by:Perry Carpenter

By understanding the attributes of organizational culture, leaders can make informed choices when trying to change cultures and improve an organization’s overall defense.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

The 3 Must Knows of Sandboxing

June 04, 2018 Added by:Boris Vaynberg

While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay.

Comments  (0)

Dfb05b2df86265de8900aa5aadd6d685

Infrastructure Under Attack

May 31, 2018 Added by:Tom Bienkowski

Any organization that delivers services over the web needs strong, purpose-built DDoS protection.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »