Security Management
Securing the Internet of Things (IoT) in Today's Connected Society
November 19, 2019 Added by:Steve Durbin
The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.
Comments (0)
What Is Next Generation SIEM? 8 Things to Look For
November 14, 2019 Added by:Avi Chesla
Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.
Comments (0)
Cybersecurity and Online Trading: An Overview
October 25, 2019 Added by:Sam Bocetta
Take a look at how and why the risks of international trade are increasing, and the political response to this.
Comments (0)
Artificial Intelligence: The Next Frontier in Information Security
October 23, 2019 Added by:Steve Durbin
The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security.
Comments (0)
Five Main Differences between SIEM and UEBA
October 23, 2019 Added by:Nilesh Dherange
Five ways in which SIEM and UEBA technology differs.
Comments (0)
For Cybersecurity, It’s That Time of the Year Again
October 17, 2019 Added by:Assaf Harel
It’s a race against time and a reactive security approach that waits for a vulnerability to be discovered and then issues patches is lacking, to put it lightly.
Comments (0)
Myth Busters: How to Securely Migrate to the Cloud
October 17, 2019 Added by:Bill Saltys
Security must remain a top priority for IT professionals during the migration process, and there is a successful pathway to safely and securely migrate to the cloud.
Comments (0)
Human-Centered Security: What It Means for Your Organization
September 24, 2019 Added by:Steve Durbin
Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.
Comments (0)
How Ethical Hackers Find Weaknesses and Secure Businesses
September 11, 2019 Added by:Johnny Rice
Approaching your currently implemented security as a target to beat or bypass is the strongest and fastest way to find any flaws that may already exist.
Comments (0)
New Passive RFID Tech Poses Threat to Enterprise IoT
September 11, 2019 Added by:Sam Bocetta
The accelerating pace of RFID tech will make our lives more convenient. With greater convenience, however, comes a greater need for security solutions.
Comments (0)
Three Strategies to Avoid Becoming the Next Capital One
August 30, 2019 Added by:George Gerchow
Three strategies to preventing catastrophic cloud security issues.
Comments (0)
Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment
August 29, 2019 Added by:Steve Durbin
Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.
Comments (0)
Ransomware: Why Hackers Have Taken Aim at City Governments
August 19, 2019 Added by:Sam Bocetta
The only way to stop the trend of ransomware is for municipal organizations to build a reputation of having strong security defenses.
Comments (0)
5 Limitations of Network-Centric Security in the Cloud
August 19, 2019 Added by:Sanjay Kalra
Traditional security solutions aim to identify threats at the perimeter of the enterprise, but threats targeting public clouds require a different level of insight and action.
Comments (0)
Eight Steps to Migrate Your SIEM
July 22, 2019 Added by:Trevor Daughney
The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.
Comments (0)
What Call Center Fraud Can Teach Us about Insider Threats
July 22, 2019 Added by:Saryu Nayyar
Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization