Latest Blog Posts

Ffc4103a877b409fd8d6da8f854f617e

University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers

December 04, 2019 Added by:InfosecIsland News

University of Arizona-led teams will be more proactive in the battle against cyberthreats thanks to nearly $1.5 million in grants from the National Science Foundation.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing the Internet of Things (IoT) in Today's Connected Society

November 19, 2019 Added by:Steve Durbin

The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.

Comments  (0)

49319ce2596a7e7bfb0ef825a9e5ea50

What Is Next Generation SIEM? 8 Things to Look For

November 14, 2019 Added by:Avi Chesla

Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Cybersecurity and Online Trading: An Overview

October 25, 2019 Added by:Sam Bocetta

Take a look at how and why the risks of international trade are increasing, and the political response to this.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Artificial Intelligence: The Next Frontier in Information Security

October 23, 2019 Added by:Steve Durbin

The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security.

Comments  (0)

Ff19c51d0400a9d7c1c7bb44749741cf

Five Main Differences between SIEM and UEBA

October 23, 2019 Added by:Nilesh Dherange

Five ways in which SIEM and UEBA technology differs.

Comments  (0)

E134f0b14f264b3818f35140571c37f8

For Cybersecurity, It’s That Time of the Year Again

October 17, 2019 Added by:Assaf Harel

It’s a race against time and a reactive security approach that waits for a vulnerability to be discovered and then issues patches is lacking, to put it lightly.

Comments  (0)

582eecdede9f699fb750b90b0f13b5cf

Myth Busters: How to Securely Migrate to the Cloud

October 17, 2019 Added by:Bill Saltys

Security must remain a top priority for IT professionals during the migration process, and there is a successful pathway to safely and securely migrate to the cloud.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Microsoft Makes OneDrive Personal Vault Available Worldwide

October 01, 2019 Added by:Ionut Arghire

Microsoft said that users all around the world can now keep their most important files protected in OneDrive Personal Vault.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Human-Centered Security: What It Means for Your Organization

September 24, 2019 Added by:Steve Durbin

Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.

Comments  (0)

019f0bfa701317d0e838d7bb01218770

How Ethical Hackers Find Weaknesses and Secure Businesses

September 11, 2019 Added by:Johnny Rice

Approaching your currently implemented security as a target to beat or bypass is the strongest and fastest way to find any flaws that may already exist.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

New Passive RFID Tech Poses Threat to Enterprise IoT

September 11, 2019 Added by:Sam Bocetta

The accelerating pace of RFID tech will make our lives more convenient. With greater convenience, however, comes a greater need for security solutions.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Android RAT Exclusively Targets Brazil

September 02, 2019 Added by:Ionut Arghire

A newly discovered Android remote access Trojan (RAT) is specifically targeting users in Brazil, Kaspersky reports.

Comments  (0)

239132446c9379ed143375ff11db6a65

Three Strategies to Avoid Becoming the Next Capital One

August 30, 2019 Added by:George Gerchow

Three strategies to preventing catastrophic cloud security issues.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29, 2019 Added by:Steve Durbin

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.

Comments  (0)

6d8601d82d764554c8430f34202031b1

If You Don’t Have Visibility, You Don’t Have Security

August 20, 2019 Added by:Shiva Mandalam

You can’t protect what you can’t see…or what you don’t know about. Without comprehensive visibility, there will always be the chance that your false sense of security could be shattered at any time as attackers discover the vulnerable assets you aren’t aware of and exploit them to gain access to your network and data.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »