Blog Posts Tagged with "Security"
Trojan Horses for the Mind
December 07, 2018 Added by:Perry Carpenter
When designed well, our messaging can sneak past mental defenses and noise. In other words, the way we design and deliver our messages can become a Trojan Horse.
Comments (0)
“You’re Both Right…Now Go To Your Rooms!”
October 02, 2018 Added by:Reuven Harrison
Traditionally, DevOps and security have butted heads, which causes a stalemate.
Comments (0)
"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening
June 27, 2018 Added by:Jeannie Warner
In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.
Comments (0)
The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
November 03, 2017 Added by:Jonathan Bregman
The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.
Comments (0)
Black Hat, DEFCON and the Summer of Our Discontent
July 21, 2016 Added by:Paul Shomo
I see wisdom behind the instinct to resist information authority. Human hierarchy tends to pyramid into increasingly fewer numbers up top. If you're going to fight for rights, there are more individuals at the bottom and more power to abuse from above.
Comments (0)
The Role of CASBs in Protection Against the 2016 “Treacherous 12"
May 03, 2016 Added by:Ganesh Kirti
We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).
Comments (0)
Key Risk Management Issues For 2016
January 13, 2016 Added by:InfosecIsland News
Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.
Comments (0)
Study Shows Few Organizations Achieving "Full DevOps" Maturity
January 12, 2016 Added by:InfosecIsland News
According to the results of a new global study, commissioned by CA Technologies (NASDAQ:CA), only 20 percent of organizations that have attempted to implement DevOps have fully deployed it.
Comments (0)
Keeping Data Secure: A Happy Marriage of Hardware & Software
November 12, 2015 Added by:Mark Papermaster
Dedicated hardware in the form of a secure processor enables more secure computing, whether on a PC, laptop, server, or an embedded device. The hardware provides encryption acceleration to protect data without slowing the user's experience.
Comments (0)
Leveraging Graph Technology to Securely Grant Employee Access
November 12, 2015 Added by:Emil Eifrem
Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.
Comments (0)
Can CTF Players Replace Professional Penetration Testers?
September 23, 2015 Added by:Ilia Kolochenko
The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.
Comments (0)
Wireless Security 101
September 09, 2015 Added by:Jayson Wylie
Not everyone is technology savvy and push to get something to function verses securing it to the extent that it should be. Even though the latest wireless routers will use the more up-to-date security configurations, there are older setups that may not be adequate.
Comments (0)
A Guide to AWS Security
August 20, 2015 Added by:Avishai Wool
Security in AWS is based on a shared responsibility model: Amazon provides and secures the infrastructure, and you are responsible for securing what you run on it.
Comments (0)
Cloud Security: It’s in the Cloud - But Where? (Part III)
July 06, 2015 Added by:Steve Durbin
Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.
Comments (0)
Preview: Suits and Spooks London - May 6-7, 2015
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
Comments (0)
The Dark Side of “You Will” in the Internet of Things
April 02, 2015 Added by:Christopher Budd
Back in the early 1990s, AT&T capitalized on this with their “You Will” campaign, which outlined some of the things they said “you will” be able to do in the future. The bright future of technology is intriguing and exciting, but we must first take responsibility for our security and privacy as to avoid any downfalls.
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization