Security Awareness

Security Awareness news, information, and how-to advice

Black Hat 2015
black white hat

smartphones 2013

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.

combat cyber crime ts

Continuous IT audits are needed to combat today's cyber threats

It's time to shift to continuous audits as cyber threats are dynamic and constantly changing, we can no longer afford to take a static snapshot of critical IT systems.

bitcoins

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.

watson dumb executives primary2

Report says smart people do dumb things online

People from the religious and legal fields were considered lazy for not following security standards.

062216blog trojan horse

Danes targeted by malware spread through Dropbox

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack

accusation

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

honey jar dripper

Honeypot catches social engineering scams on social media

Research company investigates 40,000 fake accounts to find impersonator tactics. 

smart city pexels self-driving autonomous car

Cybersecurity engineer among the hottest IT jobs on the market

Live in or around one of the five largest metro areas in the U.S.? Here’s what you can expect to make in three of the hottest IT roles around.

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

woman phone scam

Why awareness needs to teach scam detection and reaction

Most awareness programs teach users how to behave. Ira Winkler argues training needs to go further so people know what to do if they do fall victim to fraud.

cyber security insurance protection

New National Cyber Incident Response Plan

The NCIRP provides a consistent and common approach and vocabulary to enable the whole community to work together to manage cyber incidents seamlessly. The NCIRP directly responds to private sector requests for clarity on the roles...

eliminate insider threats 1

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught.

fingerprint iphone biometrics access

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

cso50 intro

The evolving role of the chief security officer

Today's Chief Security Officers (CSO) are charged with mitigating an array of interdisciplinary and intersecting risks across the enterprise. The CSO role is evolving into a mission-critical service that spans risk areas ranging from...

w 2 form

'Tis the season to watch out for W-2 phishing scams

Earlier this month, the IRS sent out an urgent alert warning employers that this W-2 phishing scam had spread beyond the corporate world to other sectors, including school districts, tribal organizations and nonprofits

bingo sign

Before you buy another cybersecurity buzzword

Your security posture should not be based on assumptions. It should be based on empiric evidence. That empiric evidence can be derived by validating your controls with security instrumentation solutions. You may very well discover...

Gmail Google Mail

Google prevents 10 million malicious emails every 60 seconds; Gmail users beware

Gmail phishing and malware attacks on Gmail users can be prevented

10 phishing

Phishing campaign uses Yahoo breach to hook email

A phishing email sent out within hours after the Yahoo breach news broke is preys on users' concern about their account security

Load More