Advertisement

black hat / hacker / spotlight / binary overlay

4 takeaways from Black Hat 2019

Experts identified new trends and warned of emerging or growing threats, including security's impact on software development and the growing threat social media poses.


detection radar computer bug threats identify breach  by the lightwriter kao studio getty
Cybersecurity Snippets

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.


Conceptual image of a network of executives / silhouettes of executives in motion.
Movers and Shakers

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.


Advertisement

secured network of computers with locks displayed on screens

Why giving users two separate systems won't improve security

Red/green systems, which give users one system for work and another for other tasks, no longer makes sense from a security and cost perspective. There are alternatives.


GDPR data privacy / data protection / security / risk management

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.


Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it where possible. Here’s how.


access control / authentication / privileges / managing permissions

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.


ransomware healthcare breach hacker
IDG Contributor Network

Have you been ransomware’d yet?

You need to understand why this is one of the most potent attacks – what you must do to avoid becoming a target.


multiple-exposure image of dollars, charts, graphs, a globe and a calculator

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it.


Advertisement

A team with megaphones promotes their message.

How to market security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan.


CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Taxpayer First Act: Improving identity verification and modernizing the IRS

With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit.


cybersecurity eye with binary face recognition abstract eye
IDG Contributor Network

Why cybersecurity is a central ingredient in evolving digital business models

Rather than being a hindrance, cybersecurity best practices give you a stable foundation on which to innovate...and can be the can be the gateway to re-imagining your business model.


CSO  >  security shield / binary code / handshake / agreement / contract

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.


BlueBorne Bluetooth attack stage fright
IDG Contributor Network

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.