9 Principles to Simplify Security
Friday, 08 November 2019
This isn’t a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that. Complexity has become a significant issue. Enterprises suffer from overcomplicated cybersecurity environments that are underutilized, undermanaged, undermonitored, and laced with misconfigurations. Complex environments cause a number of problems. They aren’t cost-efficient, it is impossible to
- Published in Attacks
1 Comment
9 Ways Data Vampires Are Bleeding Your Sensitive …
Thursday, 31 October 2019
Pull a Van Helsing on those sucking the lifeblood from your data and intellectual property. Vampires do exist — in the workplace, that is. They bleed your company of customer data, confidential information, and intellectual property (IP) — the lifeblood of any organization. These shadowy figures exist in every enterprise and take the form of
- Published in Attacks
Microsoft Issues 9 Critical Security Patches
Wednesday, 09 October 2019
None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports. Today is the second Tuesday of the month, and Microsoft is right on schedule with 59 security fixes, nine of which are considered Critical in severity. None of the vulnerablities were previously known or exploited, and
- Published in Threats, Threats Analysis
9 Things That Don’t Worry You Today (But Should)
Monday, 29 July 2019
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things. 1 of 10 (Image Source: Sergey Nivens via Adobe Stock) There are lots of things to keep a security professional up at night, from virulent malware to zero-day vulnerabilities to users wildly
- Published in Attacks
Answer These 9 Questions to Determine if Your Data …
Thursday, 25 July 2019
Data protection regulations are only going to grow tighter. Make sure you’re keeping the customer’s best interests in mind. Since the EU’s General Data Protection Regulation went into effect, California and New York have successfully passed the California Consumer Privacy Act (CCPA) and Stop Hacks and Improve Electronic Data Security (SHIELD) regulations, respectively. There are
- Published in Attacks
Ex-NSA Contractor Gets 9 Years for Retaining …
Monday, 22 July 2019
Law enforcement recovered two decades’ worth of stolen material from the home and car of former government contractor Harold Martin. A US district judge has sentenced former government contractor Harold Thomas Martin, III, to nine years in federal prison and three years of supervised release for the “willful retention of national defense information,” the Department
- Published in Attacks
Health Insurer Reports Data Breach That Began 9 …
Tuesday, 25 June 2019
Dominion National first spotted something awry in April of 2019. Dental and vision insurance provider and administrator Dominion National has begun notifying patients of a data breach of its systems that apparently dates back to August of 2010. The insurer said an incident investigation that began on April 24, 2019 led to the discovery that
- Published in Attacks
9 top hacker movies and TV shows of all time
Friday, 29 March 2019
A teenage hacker breaks into NORAD and almost starts a nuclear war. Ronald Reagan was so disturbed by the movie War Games that he signed into law the draconian Computer Fraud and Abuse Act (CFAA), a dog’s breakfast of a law that continues to loom over good-faith security researchers. Other, more lighthearted movies enchant infosec folks
- Published in Strategies
9 Problems Causing the Most Stress
Friday, 15 February 2019
Security practitioners reveal what’s causing them the most frustration in their roles. 1 of 10 Cybersecurity isn’t an easy gig. It’s tough to keep track of the most stressful problems because adversaries are constantly evolving their tactics and security threats are constantly changing. In fact, the rapid evolution of threats is one of many issues
- Published in Threat Defense, Threats
9 Cyber Security Priorities For 2019
Monday, 14 January 2019
Latest survey reveals top-of-mind focus areas for cyber security professionals Cyber Security Hub recently fielded a survey to its subscribers, which revealed 9 top-of-mind challenges, trends and focus areas for cyber security professionals to tackle in 2019. From enterprise strategy to awareness to hackers to IoT and more — here is a snapshot of the
- Published in Strategies
- 1
- 2