Articles
Here are ten ways enterprises can protect their data from cyber attacks
Continue reading...
These digital workplace technology trends took root in 2017, but we can expect to see more of them in 2018.
Continue reading...
A cyber attack dubbed “Petya” took root in Ukraine on Tuesday and is spreading across the world in what appears to be a repeat of the recent WannaCry malware attack — but “without the kill switch that saved us last time,” New York City-based cyber security firm Carbon Dynamics told
Continue reading...
Before the month of October ends, let's take a moment to acknowledge National Cyber Security Awareness Month.
It's arguably the most important and least understood awareness months out there.
Continue reading...
Risk does not exist in a vacuum. Considering it as such is a sure path to poor performance.
A Governance Model for Risk ...
Continue reading...
If people think they have effective cyber security, they are almost certainly mistaken.
Sobering Numbers
Let’s look at the results of Protiviti’s 2015 IT Security and Privacy Program. The summary offers four “key findings,” but I found other content far more important.
Continue reading...
Let’s start with a tired metaphor: "Storing crown jewels outside of castle walls."
So, if Information Security is like medieval Europe, then companies are the feudal lords who spend their money building really strong walls to keep enemies at bay.
Continue reading...
Most of us panic when the lights go off. God help us when we lose our Internet connection.
Continue reading...
If the cyber attack on the US federal government doesn’t get you concerned about enterprise security it should.
Yesterday, we began a discussion on security for enterprises in light of the 4 million personnel records exposed earlier this month. Cyber attackers targeted the Office of Personnel Management (OPM) and may
Continue reading...
Think your organization is safe if it minds its own security? Think again. You’ve also got to worry about security at all those companies you associate with, from suppliers and consulting firms to PR agencies, systems integrators, event planners and even heating and cooling vendors.
Continue reading...
What's the best defense against cybercrime? Surprisingly, it might be a big mouth. Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense. And as proof, you need look not further than recent examples in the public, private and non-profit sector.
Continue reading...
Here’s something to think about the next time your team crafts an email marketing message. "About two thirds of cyber attacks start with an email," said Patrick Peterson, founder and CEO of San Mateo, Calif.-based Agari, a security solutions provider.
Continue reading...
Cybersecurity wasn't even the stuff of dreams when George Washington delivered the first State of the Union message to Congress on Jan. 8, 1790. But fast forward to 2015 and there it was, playing a prominent role in Barack Obama's annual address to the nation.
Continue reading...
Similarly, an organization needs to be able to detect attacks, especially attacks using a new method, if it is to respond, limit the damage and harden its defenses. Few organizations can do all of this with only internal resources.
Continue reading...
Displaying 1-14 of 18