Information Security

Information Security news, information, and how-to advice

European Union, EU
The increasingly fast speed of business-computing-technology.

Dana Deasy

The Top 3 cyber priorities for DOD’s incoming CIO

The DOD’s new top IT executive Dana Deasy will be an important cog in DOD’s big push toward universal defense cloud adoption, facilitating organizational changes that will make the military’s cyber defense more streamlined and...

4 shock stunned fear

Negative motivation is not positive engagement

The barrage of fearmongering and FOMO over social media and advertising leads to a vicious cycle of negative engagement that builds anger and frustration that can’t be addressed by buying new products. We can break the cycle through...

baby working on a laptop

The immature security industry

The security industry often tries to do everything instead of putting focus on a singular area where we can make a real difference. This is a sign of an immature industry.

healthcare security

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

cyber crime cybersecurity

Implementing the NIST cybersecurity framework could be worth at least $1.4m to your business

While there are many other frameworks available, the NIST CSF provides a nationally recognized guideline as you scale your business and cybersecurity program.

cyberwarfare defense illustration

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

networking wan

Overcoming the security challenges of software defined networking

SD-WANs potentially offer many compelling benefits. However, the result is that organizations have less knowledge about the infrastructure that is being used.

Facebook Data Debacle - Android

Breaking down Facebook’s communications playbook

Lessons learned from Facebook’s response to its data privacy crisis, and how you can use them to protect your own reputation – even if you aren’t a tech giant.

children classroom laptops students thinkstockphotos 617577684

Technology must be part of solution for empowering rural women and girls

United Nations addresses challenges to create and expand economic opportunity for rural women and girls, but the world must commit to technology-driven solutions. And as we face increasing cyberthreats, shouldn’t women be part of the...

cloud security ts

Driving cybersecurity and digital transformation with cloud technologies

Enterprises – especially in regulated industries – need to demonstrate compliance with NIST, HIPAA and GDPR to address an increasing set of privacy and cybersecurity threats. Cloud computing platforms provided a ready-made solution,...

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

balance - measure - comparison - risk assessment

Want IT resiliency? Stop the see-saw of imbalanced attention

As cyber threats continue to grow among companies with sensitive data, IT must take a holistic approach to managing and mitigating these threats. Here’s how to bridge preventative and restorative measures for IT resiliency.

avast security pro for mac icon

Law enforcement uses anti-virus software to recover suspect's web history

Let’s mainstream the idea that privacy is almost impossible in the face of digital forensics. Avast AV leaving behind a private browsing database, is a shocking illustration of this.

guardians

Do you know who the new Guardians of the Galaxy are? It’s the morally upright CISOs

The digital consumer’s new best friend in large enterprises is the CISO – the custodians of the enterprise assets are now expanding their vision to include your and my data (at least the morally upright and forward-thinking ones)

3 legal law books

Insider threat legalese

Understanding your lawyer’s perspective on insider threats...and three suggestions to help start the conversation.

Computerworld - Scary Tech [Slide-03] - Facial recognition systems reporting to secret govt agencies

Protecting trade secrets: technology solutions you can use

The fourth and final part of a series on stopping trade secret theft in your organization.

enhancing ddos defenses with a web application firewall

Your cache is exposed

On February 28, Akamai recorded a 1.35 Tbps DDoS attack driven by a relatively new vector, memcached reflection. Memcached can have an amplification factor of roughly 500,000 times larger than the initial query, which allows small set...

security map digital encryption identity

From NSTIC to improved federal identity, credential and access management

OMB’s ICAM policy change leverages NIST’s Digital Identity Guidelines permitting the use of non-PIV, AAL 3 credentials for logical access, and tasks agencies to accept federated credentials for consumers conducting transactions online....

Load More