Information Security

Information Security news, information, and how-to advice

Robot Artificial Intelligence chat bot
Hooded man hacking computer with green binary background

4 prevention

Detecting malicious insiders: a new use case for data loss prevention

A discussion with Symantec’s Nico Popp about how DLP has evolved over the years.

lighthouse beam beckons to a businessman in a boat on a sea of red tape

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

Stack of legal documents with compliance and regulatory stamp

Taking cybersecurity beyond a compliance-first approach

A compliance first approach to security is fundamentally insecure. It's time for companies to change the mindset, go beyond simply meeting regulatory requirements and focus on truly protecting data.

shadows of team figures collaborating, each holding up gears that work together

Collaborative security

We have far too closed of a mindset when we handle security problems.

blind spot side view mirror car vehicle

You can’t protect what you can’t see

Visibility is a fundamental cybersecurity strategy to protect network assets and information.

11 victims

The victim notification conundrum

Now is the time for the security ecosystem to take stronger action to identify and address compromised computers – sharing lists of known compromises and simply observing the problem is not enough

5 fumbling dumb mistake

Dear IT security pros: it's time to stop making preventable mistakes

Examining commonalities: shared strategies or mistakes across multiple cybersecurity incidents.

European Union, EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

vulnerable breach hacked indecision

How to approach business leaders about cybersecurity when they don’t follow the breach headlines

Hint: hit them where it hurts the most – their own personal reputation and livelihood.

eye binary IDS Intrusion Detection System

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

13 ssl

TLS/SSL security for websites

What if I told you that the TLS/SSL protocols can provide impenetrable protection for your company’s website? While completely untrue (nothing is impenetrable),TLS/SSL can provide strong data privacy, dependable data integrity and...

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

little girl sunglasses bright future predictions big data

What cybersecurity surprises does 2018 hold?

One thing's for sure: securing ourselves and our organizations will only get more difficult this year.

vulnerable gdpr breach security cyber attack

CISOs: What you can control – and what you can’t – in GDPR

80% of GDPR is out of the CISO’s control...

cloud computing shared public cloud

Are shared services the answer to data protection?

There are still some issues to be addressed before everyone will be fully on board with the idea of shared services in government. But because the government is increasingly moving to the cloud, the sooner everyone is on board, the...

man looking at exit quit termination

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

8 code driven security

Model-driven security: using unconventional controls to stay ahead of threats

We need to get out of our own way in terms of how we think about and implement security, while enlisting analytics and data science as our allies.

Load More