Slideshows

shadowy attacker hooded (public domain)
1 incident response police tape crime death

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

0 iot intro smart appliances

Six things you need to know about IoT security

It’s in every company’s best interest to “do” IoT correctly, which will mean ratcheting up security measures to capture and ensure a good customer experience. Jack Nichols, director of product management at Genesys, proivdes six ways...

1 kids intro

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online"...

1 tracking hunting dogs horse

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

0 intro strikeout baseball

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

3 sensitive data hacker phone

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by...

security tools intro slide

9 security tools for the mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

1 measure roi

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

post-it with the word

IT mistakes that could cost an organization millions

Here are some scenarios for N00bs to safeguard against costly mistakes for them and their company.

1 buying decision

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

1 sign contract

What's in the fine print of your disaster recovery vendor agreement?

Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises...

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

cyberseceng

The 20 highest-paying markets for cyber security engineers

IT security professionals are in high demand in most job markets, but some metropolitan areas are better than others when it comes to offering a top pay check. Randstat recently released its annual IT salary study, which looked at the...

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

0 demands campus college gates

Why you should study security in college

An expert at Brown University provides a counterpoint to an earlier story on why you don't need to study security in college.

1 running back football

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted

1 one true path

Infosec careers: There is no one true path

It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security...

1 intro spearfishing

What enterprises can learn in the aftermath of a phishing attack

Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn...

Load More