Infosec Island

0fd0758565844dd411fbfb4600a7b981

Could a Credit-Like Security Score Save the Cyber Insurance Industry?

October 11, 2018 Added by:Joseph Kucic

Enterprises need access to cyber insurance that accurately reflects their current security posture and that covers both direct and indirect expenses.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

“You’re Both Right…Now Go To Your Rooms!”

October 02, 2018 Added by:Reuven Harrison

Traditionally, DevOps and security have butted heads, which causes a stalemate.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

It's Time to Get Real about Complex, Emerging Threats

September 12, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Why Admin Rights Removal Is only the First Step towards Data Protection

September 11, 2018 Added by:Andrew Avanessian

Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.

Comments  (0)

26104e7f12ca49e1208007765787726d

New Payment Tech, New Security Challenges

September 04, 2018 Added by:Simon Blake-Wilson

New apps and technologies present payment providers with new types of threats.

Comments  (0)

D5cad47c94727a4c525129559ae89d17

CVE-2018-11776 — The Latest Apache Struts Vulnerability

September 04, 2018 Added by:Fred Bals

A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The Importance and Requirements of Privileged Access Management

August 30, 2018 Added by:Joseph Carson

The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

Why the World Needs Disruptive, Effective, Modern Cyber Protection

August 28, 2018 Added by:Boris Vaynberg

Companies need to look for a solution that strengthens their cyber defenses dramatically by preventing attacks before they enter and harm their organization, their customers and their brand.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems

July 03, 2018 Added by:Steve Durbin

In the face of mounting global threats, organization must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

4 Cybersecurity Tips for Staying Safe During the World Cup

June 13, 2018 Added by:Joseph Carson

As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

The 3 Must Knows of Sandboxing

June 04, 2018 Added by:Boris Vaynberg

While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay.

Comments  (0)

6a1fbf6a6315721b9e8931e69112c21e

SOC Automation: Good or Evil?

May 24, 2018 Added by:John Moran

The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

PyRoMine Malware Sets Security Industry on Fire

May 03, 2018 Added by:Boris Vaynberg

Despite all the investments in cyber protection and prevention technology, it seems that the cyber terrorist’s best tool is nothing more than variations on previous exploits.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Avoiding Holes in Your AWS Buckets

April 12, 2018 Added by:Sanjay Kalra

Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.

Comments  (0)

809e5bf42b3c61540fdf08a772a9d960

The Three Great Threats to Modern Civilization

April 12, 2018 Added by:Jessica Lavery

There are three main threats to our modern civilization that could cause humanity to go the way of the ancient Mayans.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

2020 Vision: How to Prepare for the Future of Information Security Threats

April 06, 2018 Added by:Steve Durbin

A highlight of the top nine threats to information security over the next two years.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »