Slideshows

1 intro insider threat
1 threat intro

01 intro byod

What to consider in developing BYOD policy

In today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the...

1 gap

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

0 intro tax

Five tips to be ‘security smart’ this tax season

Every year there are scams to dupe you into filing your taxes with the wrong collector

0 intro

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

01 farmers revenge

The IT equipment you can take into battle

If you're in IT, you're as familiar with your laptop and your cell phone as a farmer is with his tools. And just like Japanese farmers with their kama, you might find yourself using one of those tools in battle, for offense or...

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

1 reddit intro

The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for.

01 respond attack

How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software...

1 intro toys

6 dangerous toys that are not child's play

Here is a look back at six toys that were breached.

unfilled it job roles

Security engineer among 15 unfilled tech jobs that cost the U.S. billions

What's the overall cost of unfilled technology jobs? New research from Glassdoor shows it's in the billions.

1 threatening

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

fingerprint iphone biometrics access

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

1 recovering days

Why DRaaS is a better defense against ransomware

Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.

1 oscar intro

And the Oscar goes to… Cybersecurity!

Imagine if the Oscars’ categories applied to cybersecurity.

0 shadow it intro

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

Load More