IT - Security
5 Sep 2017
we Need to Stop Dehumanizing Security Before It's Too Late
CSO Online, September 5th, 2017

"Gary Golombco-founder of Awake Security, lines up for a Security Slap Shot on the need to bring the human element back to the security operation center...

If you're in security, how do you describe your job? If you're not in security, how do you describe security?..."
(Get More Information . .)

5 Sep 2017
Endpoint Security Overload
Dark Reading, September 5th, 2017

"CISOs and their teams are over-investing in endpoint security tools, driving inefficiency and a need to consolidate data.

An excess of endpoint security tools in organizations is driving "information security debt," according to a new study.

The 'Voice of the Enterprise' report by 451 Research and Digital Guardian on the use and consolidation of endpoint security tools found that the more endpoint security systems an enterprise has, the greater the cost of managing them. Security teams are struggling with inefficiency because they're moving from dashboard to dashboard all day..."
(Get More Information . .)

5 Sep 2017
Cybersecurity Basics Still a Key Component in Managing Digital Risks
Search CIO, September 5th, 2017

"Securing the digital enterprise is becoming increasingly complex, but companies should not forget the cybersecurity basics and tap into the power of its available technology, people and processes...

As ransomware like WannaCry and Petya make headlines, securing the digital enterprise has become a top priority for companies. But to understand the risks of the digital world, organizations need to know where they are on their cybersecurity journey, according to a recent cybersecurity report released by communications company BT and consulting firm KPMG..."
(Get More Information . .)

    6 Sep 2017
    How to Implement a Solid Identity and Access Management Strategy (Slideshow)
    eWeek, September 6th, 2017

    "Most enterprises select and implement technology to perform tasks better, deliver higher value to users, fulfill their business mission and become more agile as an organization. But it often happens that many IT initiatives, including identity and access management (IAM), deter new technology initiatives and hamstring a company's IT agility. This is largely because IAM can appear to be an unwelcome process for employees to learn. In this eWEEK slide show, One Identity Product Marketing Manager Todd Peterson explains 11 universal truths of IAM that provide common-sense guidance on how to implement a solid IAM strategy - without impeding business agility..."
    (Get More Information . .)

    7 Sep 2017
    Inaudible Ultrasound Commands Can be Used to Secretly Control Siri, Alexa, and Google Now
    The Verge, September 7th, 2017

    "It's an effective hack, but unlikely to do much damage in the real world...

    Is your digital assistant taking orders behind your back? Scientists from China's Zheijiang University have proved it's possible, publishing new research that demonstrates how Siri, Alexa, and other voice-activated programs can be controlled using inaudible ultrasound commands. This provides a new method of attack for hackers targeting devices like phones, tablets, and even cars..."
    (Get More Information . .)

      7 Sep 2017
      The 16 Biggest Data Breaches of the 21st Century
      CSO Online, September 7th, 2017

      "Security practitioners weigh in on the 16 worst data breaches in recent memory.

      • Yahoo -Adult Friend Finder
      • eBay
      • Equifax
      • Heartland Payment Systems
      • Target Stores
      • TJX Companies, Inc.
      • JP Morgan Chase
      • US Office of Personnel Management (OPM)
      • Sony's PlayStation Network

      Data breaches happen daily, in too many places at once to keep count. But what constitutes a huge breach versus a small one?..."
      (Get More Information . .)

      8 Sep 2017
      Insider Threats and Ransomware are Most Feared, Followed by DDoS Attacks
      Help Net Security, September 8th, 2017

      "A new SANS survey found that ransomware, insider threats and denial of service are considered the top three threats organizations face when it comes to securing sensitive data.

      According to the study, 78 percent of respondents report encountering two or more threats to their data in the past 12 months, while 12 percent actually encountered a breach, with 43 percent of those encountering exfiltration of sensitive data through encrypted channels..."
      (Get More Information . .)

        See all archived IT - Security articles See all articles from this issue