Information Security

Information Security news, information, and how-to advice

Stack of legal documents with compliance and regulatory stamp
shadows of team figures collaborating, each holding up gears that work together

blind spot side view mirror car vehicle

You can’t protect what you can’t see

Visibility is a fundamental cybersecurity strategy to protect network assets and information.

11 victims

The victim notification conundrum

Now is the time for the security ecosystem to take stronger action to identify and address compromised computers – sharing lists of known compromises and simply observing the problem is not enough

5 fumbling dumb mistake

Dear IT security pros: it's time to stop making preventable mistakes

Examining commonalities: shared strategies or mistakes across multiple cybersecurity incidents.

European Union, EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

vulnerable breach hacked indecision

How to approach business leaders about cybersecurity when they don’t follow the breach headlines

Hint: hit them where it hurts the most – their own personal reputation and livelihood.

eye binary IDS Intrusion Detection System

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

13 ssl

TLS/SSL security for websites

What if I told you that the TLS/SSL protocols can provide impenetrable protection for your company’s website? While completely untrue (nothing is impenetrable),TLS/SSL can provide strong data privacy, dependable data integrity and...

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

little girl sunglasses bright future predictions big data

What cybersecurity surprises does 2018 hold?

One thing's for sure: securing ourselves and our organizations will only get more difficult this year.

vulnerable gdpr breach security cyber attack

CISOs: What you can control – and what you can’t – in GDPR

80% of GDPR is out of the CISO’s control...

cloud computing shared public cloud

Are shared services the answer to data protection?

There are still some issues to be addressed before everyone will be fully on board with the idea of shared services in government. But because the government is increasingly moving to the cloud, the sooner everyone is on board, the...

man looking at exit quit termination

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

8 code driven security

Model-driven security: using unconventional controls to stay ahead of threats

We need to get out of our own way in terms of how we think about and implement security, while enlisting analytics and data science as our allies.

cybersecurity boards

Hacking security awareness: the program-changing magic of the advisory board

Most successful company programs have a few common traits, one of them being an advisory board. Advisory boards can propel security awareness programs into uncharted levels of success, yet most programs today don't utilize this simple...

hearts

7 ways to stay safe online on Valentine’s Day

Looking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet.

businessmen with umbrellas risk protected storm

How do I BRI?

Regardless of the threats, risks and security challenges a business may face, it’s crucial to recognize that having the right approach to intelligence has truly become a requirement.

vulnerable security breach innocent attacked

The global ungoverned area

Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure.

Load More