1 2 3 4 5 6 7 8 9 10 11 next
Archived IT - Security Articles
14 Sep 2017
open to premium members only
Don't Discount Overwhelming Insider Security Threats [66465]
ITProPortal, September 14th, 2017

"Not every insider threat is malicious and sometimes employees unintentionally expose privileged information...

Organizations around the world are constantly reminded of the consequences associated with data breaches - most recently with credit agency Equifax's data breach affecting 143 million U.S. consumers.."
(Get More Information . .)

13 Sep 2017
open to premium members only
17 Pen Testing Tools the Pros Use [66459]
CSO Online, September 13th, 2017

"We asked a few professional hackers for their thoughts on the best penetration testing tools. Here's what they said.

Penetration testing (pen testing) is a practice undertaken by professional hackers to find the vulnerabilities in your systems - before the attackers do. It requires clever thinking, patience, and a little bit of luck. In addition, most professional hackers will need a few specific tools to help get the job done.

CSO recently spoke to a few security experts - some who are full-time red team operators and developers themselves - and asked them to share their favorite tools..."
(Get More Information . .)

13 Sep 2017
open to premium members only
5 Problems That Keep CISOs Awake at Night [66462]
Dark Reading, September 13th, 2017

"The last few years have shown a big difference in the way cyber-risks are acknowledged, but progress still needs to be made.

On a recent trip from Washington, DC, to Boston, I overheard a conversation on the train that I never thought I would hear. The discussion began with a passenger asking his colleague, 'Did you just get this spearphishing attack? It looks so obvious'..."
(Get More Information . .)

12 Sep 2017
open to premium members only
Deception: A Convincing New Approach to Cyber Defense [66464]
Dark Reading, September 12th, 2017

"How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers and contain damage.

We live in a reality of continually multiplying attack vectors. Hackers are using increasingly brazen methods to break past perimeter defenses, using stolen credentials and backdoors, phishing, spyware and malware, brute force, and more. Once attackers have successfully breached a network, they typically have plenty of time to do significant damage..."
(Get More Information . .)

12 Sep 2017
open to premium members only
The Silent Threat of Cyber Security [66466]
Networks Asia, September 12th, 2017

"It's a company's worst fear to have its information technology (IT) system hacked, sensitive documents leaked, websites altered or data wiped. The government's recent proposed Cyber Security Bill for public consultation is a strong step in the right direction and is further evidence that discussions on cybercrime are more vital than ever, especially as attacks on critical information infrastructure (CII) systems that manage essential services (i.e., utility plants, transportation networks and hospitals) have become more frequent, and with resulting disruptions that could cripple economies and lead to loss of life..."
(Get More Information . .)

11 Sep 2017
open to premium members only
20 Questions to Help Achieve Security Program Goals [66460]
Dark Reading, September 11th, 2017

"There are always projects, maturity improvements, and risk mitigation endeavors on the horizon. Here's how to keep them from drifting into the sunset.

Recently, I was at the beach and found myself gazing out toward the horizon. Of course, as we all know, if you were to travel out into the sea trying to reach the horizon, you would never get there. The horizon just keeps on moving right along with you..."
(Get More Information . .)

 
 1 2 3 4 5 6 7 8 9 10 11 next