Security Awareness

Ffc4103a877b409fd8d6da8f854f617e

Reddit Names Allison Miller as Chief Information Security Officer (CISO)

February 22, 2021 Added by:InfosecIsland News

Social news community site Reddit announced has hired Allison Miller as Chief Information Security Officer (CISO) and VP of Trust.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Names Ryan Naraine as Editor-at-Large

January 18, 2021 Added by:InfosecIsland News

SecurityWeek has named Ryan Naraine as Editor-at-Large, adding a veteran cybersecurity journalist and podcaster to its editorial team.

Comments  (0)

160a4cbe9073658eb91a86d8817cbd42

BSIMM11 Observes the Cutting Edge of Software Security Initiatives

October 21, 2020 Added by:Taylor Armerding

In addition to helping an organization start an SSI, the BSIMM also gives them a way to evaluate the maturity of their SSI.

Comments  (0)

Default-avatar

Sustaining Video Collaboration Through End-to-End Encryption

October 21, 2020 Added by:Michael Armer

By infusing end-to-end encryption into any video strategy, it ensures not only the sustainability of the channel, but the businesses that rely on it.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Will Robo-Helpers Help Themselves to Your Data?

September 08, 2020 Added by:Steve Durbin

Are you sure that your robo-helpers are secure?

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Avoiding Fuelling the Cyber-Crime Economy

August 11, 2020 Added by:Marc Wilczek

What drives the cyber-crime economy, and how can organizations prevent their data being used as a criminal commodity?

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

No Silver Bullet for Addressing Cybersecurity Challenges During Pandemic

August 10, 2020 Added by:Liviu Arsene

As the coronavirus pandemic forced organizations to migrate to a work-from-home context, security professionals faced new challenges.

Comments  (0)

5fbfa7473f12e37a0ebbc623dcd9619f

Could the Twitter Social Engineering Hack Happen to You?

August 10, 2020 Added by:Tim Mackey

The phishing attack on Twitter employees serves as an opportunity for all businesses to reassess how they build and deploy application

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Augmented Reality Will Compromise the Privacy and Safety of Attack Victims

July 08, 2020 Added by:Steve Durbin

Augmented Reality (AR) technologies will provide new opportunities for attackers to compromise the privacy and safety of their victims.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Threat Horizon 2022: Cyber Attacks Businesses Need to Prepare for Now

May 01, 2020 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors

April 07, 2020 Added by:Steve Durbin

Marriott International has experienced their second data breach

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Benchmarking the State of the CISO in 2020

March 27, 2020 Added by:Marc Wilczek

A run-down of Cisco's 2020 CISO Benchmark Report.

Comments  (0)

7e5878d1746c69c0ac1f9b86dfcc5ed9

When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)

73b84d66b198db6ac26bc8a35d479042

Is Cybersecurity Getting Too Complex?

January 13, 2020 Added by:Sam Rubin

To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats Organizations Must Prepare for in 2020

January 08, 2020 Added by:Steve Durbin

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »