Data Loss Prevention

Data Loss Prevention (DLP)

People walking with airplane in background
security threats and vulnerabilities

hikvision cameras

Critical Hikvision flaw could be remotely exploited to hijack cameras, DVRs and accounts

Hikvision patched a critical flaw that allowed attackers to access and manipulate cameras and DVRs as well as hijack accounts.

ransomware breach hackers dark web

Another night at the information security museum

Firms need to put fundamental information security processes in place to ensure they don’t become ransomware victims. It’s not that difficult, people.

draft eprivacy regulation   privacy by design

Data and privacy breach notification plans: What you need to know

Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoid that.

agile devops

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

CSO: Have you met these hackers? [slide 01]

10 types of hackers and how they'll harm you

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.

04 cyberlaws gavel

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

virus detection

How to stop threats before they hit your network

The beauty of anomaly detection

rsa conference 2017

Quick take-aways from the RSA Security Conference

Last week's RSA Security Conference had good discussions and industry focus, but there was too much hype -- and there's lots of work ahead.

RSA conference 2017

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

frustrated computer user

Tech support scams are on the rise, up 24%, warns Microsoft

Social engineering attacks like the Microsoft tech support scams still work. Fake cold calls, fake messages on websites, and malicious emails continue to trick victims.

Dana Deasy

The Top 3 cyber priorities for DOD’s incoming CIO

The DOD’s new top IT executive Dana Deasy will be an important cog in DOD’s big push toward universal defense cloud adoption, facilitating organizational changes that will make the military’s cyber defense more streamlined and...

cloud computing - data center

Review: Protecting clouds with Cloud Defender from Alert Logic

Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic...

4 shock stunned fear

Negative motivation is not positive engagement

The barrage of fearmongering and FOMO over social media and advertising leads to a vicious cycle of negative engagement that builds anger and frustration that can’t be addressed by buying new products. We can break the cycle through...

healthcare security

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

cyber crime cybersecurity

Implementing the NIST cybersecurity framework could be worth at least $1.4m to your business

While there are many other frameworks available, the NIST CSF provides a nationally recognized guideline as you scale your business and cybersecurity program.

cyberwarfare defense illustration

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

Load More