Infosec Island News

2054518f64771a7898b1b5d0a1e146cc

Examining Potential Election Vulnerabilities: Are They Avoidable?

April 07, 2020 Added by:Tim Matthews

In the U.S and global communities, election security is a large concern.

Comments  (0)

5fbfa7473f12e37a0ebbc623dcd9619f

Password Shaming Isn’t Productive – Passwords Are Scary Business

January 15, 2020 Added by:Tim Mackey

With the complexity of consumer devices only increasing, contextual security should be a priority for all – a situation which would avoid password shaming.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Five Key Cyber-Attack Trends for This Year

January 14, 2020 Added by:Marc Wilczek

5 key cyber-attack trends that are expected to develop during the coming months.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

20/20 Vision on 2020's Network Security Challenges

January 13, 2020 Added by:Avishai Wool

Organizations will likely need to embrace more automation across all security and compliance-related processes.

Comments  (0)

73b84d66b198db6ac26bc8a35d479042

Is Cybersecurity Getting Too Complex?

January 13, 2020 Added by:Sam Rubin

To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats Organizations Must Prepare for in 2020

January 08, 2020 Added by:Steve Durbin

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing the Internet of Things (IoT) in Today's Connected Society

November 19, 2019 Added by:Steve Durbin

The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.

Comments  (0)

49319ce2596a7e7bfb0ef825a9e5ea50

What Is Next Generation SIEM? 8 Things to Look For

November 14, 2019 Added by:Avi Chesla

Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Cybersecurity and Online Trading: An Overview

October 25, 2019 Added by:Sam Bocetta

Take a look at how and why the risks of international trade are increasing, and the political response to this.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Artificial Intelligence: The Next Frontier in Information Security

October 23, 2019 Added by:Steve Durbin

The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security.

Comments  (0)

Ff19c51d0400a9d7c1c7bb44749741cf

Five Main Differences between SIEM and UEBA

October 23, 2019 Added by:Nilesh Dherange

Five ways in which SIEM and UEBA technology differs.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Human-Centered Security: What It Means for Your Organization

September 24, 2019 Added by:Steve Durbin

Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29, 2019 Added by:Steve Durbin

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.

Comments  (0)

019f0bfa701317d0e838d7bb01218770

Top Three Cross-Site Scripting Attacks You Need to Know Now

July 31, 2019 Added by:Johnny Rice

Cross-Site scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users.

Comments  (0)

2bbe09d8431465f396a98305e7a1c5a6

What Call Center Fraud Can Teach Us about Insider Threats

July 22, 2019 Added by:Saryu Nayyar

Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cybersecurity: Drones Will Soon Become Both Predator and Prey

July 19, 2019 Added by:Steve Durbin

Like other IoT devices, drones currently have very poor security controls, making them vulnerable to hijacking.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »