Infosec Island

D36d0936f0c839be7bf2b20d59eaa76d

On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure

June 04, 2019 Added by:Steve Durbin

Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware.

Comments  (0)

B6749cd99f8cb495abe4ed3508a31c08

Thoughts on DoS Attack on US Electric Utility

June 04, 2019 Added by:Phil Neray

The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.

Comments  (0)

46208e1048c9421f04baab5dc8814df3

Answering Tough Questions About Network Metadata and Zeek

May 08, 2019 Added by:Kevin Sheu

As security operations teams search for the best threat data to analyze in their data lakes, network metadata often lands in the category of being just right.

Comments  (0)

404b3b611dd8d2186d07c3a74d2fb4da

SOAR: Doing More with Less

April 26, 2019 Added by:Michele Zambelli

Implementing an SOAR model can provide the glue to make this security intelligence actionable using repeatable processes for faster incident response that does not require adding more resources.

Comments  (0)

408ac1e5b2b05b63e650bd356018b62c

Gaining Control of Security and Privacy to Protect IoT Data

April 24, 2019 Added by:Mike Nelson

It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Growing Reliance on Digital Connectivity Amplifies Existing Risks, Creates New Ones

April 24, 2019 Added by:Steve Durbin

Major threats to information security emerging over the next two years could impact businesses operating in cyberspace at break-neck speeds.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging

March 27, 2019 Added by:Perry Carpenter

Let’s talk about another Trojan Horse for the Mind -- visuals.

Comments  (0)

47c22ebc25ad3d1dac97fc04f17f8e52

The Role of Analytics in Protecting Healthcare Data Privacy and Security

February 27, 2019 Added by:Nilesh Dherange

Healthcare companies face their biggest threats from malicious insiders that abuse their access privileges to view or exfiltrate PII and PHI.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Trump Administration Starts the Ball Rolling with the National Cyber Strategy

February 19, 2019 Added by:Sam Bocetta

The topic of cybersecurity won’t go away. Like national security in general, it will remain eternal fodder for future politicians to bat around

Comments  (0)

6dc5fbf4195307a7504ede26fd385662

A Call to Structure

February 15, 2019 Added by:Chris O'Brien

One of the most significant challenges you face when building a threat Intelligence team is about how to best take on the ever-growing amount of Threat Intel.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

What CEOs Need to Know About the Future of Cybersecurity

February 14, 2019 Added by:Steve Durbin

CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges.

Comments  (0)

71fd135c31a6d0bc64f3b46c190a4590

2019 Predictions: What Will Be This Year’s Big Trends in Tech?

January 16, 2019 Added by:Matt Johnson

What will 2019 bring, and how can businesses prepare themselves for the technological developments to come over the next twelve months?

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board

January 04, 2019 Added by:Steve Durbin

Four security topics businesses should focus on in 2019.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Unlocking the Power of Biometric Authentication with Behavior Analytics

January 04, 2019 Added by:Jackson Shaw

As biometrics continues to gain popularity in the authentication world, it’s important to keep in mind that multi-factor authentication is critical and behavior biometrics alone are not enough to fully protect your business.

Comments  (0)

7ef71cd75aa3f9af047bff6623ac9259

2019, The Year Ahead in Cloud Security

January 02, 2019 Added by:Peter Martini

In 2019, cloud security will confound organizations as concerns over data privacy, and the security skills gap pervade. But the cloud will come to its rescue.

Comments  (0)

4238fc46fe869de66700ec14d6738248

IT security Predictions for 2019 – Verifying Trust

December 19, 2018 Added by:Scott Gordon

With moves towards Hybrid IT adoption showing no signs of slowing down, 2019 will be the year when Zero Trust and Software Defined Perimeter take shape!

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »