Slideshows

security tools intro slide

9 security tools for the mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

1 measure roi

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

IT mistakes that could cost an organization millions

Here are some scenarios for N00bs to safeguard against costly mistakes for them and their company.

1 buying decision

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

1 sign contract

What's in the fine print of your disaster recovery vendor agreement?

Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises...

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

cyberseceng

The 20 highest-paying markets for cyber security engineers

IT security professionals are in high demand in most job markets, but some metropolitan areas are better than others when it comes to offering a top pay check. Randstat recently released its annual IT salary study, which looked at the...

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

0 demands campus college gates

Why you should study security in college

An expert at Brown University provides a counterpoint to an earlier story on why you don't need to study security in college.

1 running back football

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted

1 one true path

Infosec careers: There is no one true path

It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security...

1 intro spearfishing

What enterprises can learn in the aftermath of a phishing attack

Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn...

1 intro

5 ways data classification can prevent an insurance data breach

Spirion CEO Todd Feinman offers examples of how insurance firms can leverage data classification to reduce the risk of data theft and costly compliance violations.

email encryption

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies...

1 picture that key

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

0 intro linkedintroll

Hackers continue to troll LinkedIn

These attacks are becoming more common because it’s easy and inexpensive. Cylance has created some tips to help fend off these attacks.

1 intro visitor

Social engineering fake outs

Learn how a consultant infiltrated his client’s buildings and networks.

1 intro insider threat

How to stop insider threats

There are a number of things that decision makers can do to protect their companies and minimize, if not eliminate, the threat of employee theft of sensitive and confidential information.

1 threat intro

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access.

01 intro byod

What to consider in developing BYOD policy

In today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the...

Load More