December 6, 2019
Via: Help Net SecurityNotable regulatory compliance and risk challenges remain high in a number of key areas for U.S. banks and credit unions, according to the results of a Wolters Kluwer survey. Rising risk challenges for financial organizations This year’s survey generated a […]
August 26, 2019
Via: Help Net SecurityPassword managers are one of the most powerful defenses against breaches, which can cause massive damage and be incredibly expensive to mitigate. According to the Ponemon Institutes’ 2019 Password and Authentication Security Behaviors Report, 51% of respondents experienced a phishing […]
Application security, Security
January 18, 2019
Via: Security WeekThe new PCI Secure Software Standard and the PCI Secure Lifecycle (SLC) Standard are part of a new Software Security Framework and their goal is to ensure that the development of payment software keeps up with modern practices. The PCI […]
December 12, 2018
Via: Threat PostNYC — From Delta Airlines to Best Buy, a number of big-name companies were involved this year in data breaches – but even though their names made headlines, the actual security incidents occurred due to flaws in third-party partners. Across […]
December 7, 2018
Via: Help Net SecurityTrend Micro revealed that 43 percent of surveyed organizations have been impacted by a Business Process Compromise (BPC). Despite a high incidence of these types of attacks, 50 percent of management teams still don’t know what these attacks are or […]
November 7, 2018
Via: Security IntelligenceWe all want faster, better endpoint management solutions at a reduced cost — but how? In part one of this series, we broke down the SANS Institute report, “Understanding the (True) Costs of Endpoint Management,” and identified the top five […]
October 31, 2018
Via: Security IntelligenceCompanies today are paying much more than they realize for endpoint management in terms of money, resources and speed — many of which are hidden expenses. A recent SANS Institute report titled “Understanding the (True) Costs of Endpoint Management,” examined […]
October 9, 2018
Via: Help Net SecurityHITRUST is helping start-up companies make information privacy and security a foundational component while still focusing on growing their business with the introduction of the RightStart Program. The newly introduced program helps start-ups accelerate their adoption of the risk management, […]
February 2, 2018
Via: Security IntelligenceEndpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Pervasive Endpoint Vulnerabilities Attacks come from all directions, and many of them originate on endpoints. […]
December 12, 2017
Via: Dark ReadingOracle updates its Identity SOC and management cloud with security tools to verify and manage users trusted with access to cloud-based data and applications. Oracle is expanding its Identity SOC portfolio and Management Cloud with new cloud-based tools for identity […]
November 27, 2017
Via: CSO OnlineVulnerability management is the process of staying on top of vulnerabilities so the fixes can be more frequent and effective. Vulnerabilities in need of fixing must be prioritized based on which ones post the most immediate risk to the network. […]
February 1, 2017
Via: InfoWorldCloud doubters often raise compliance requirements as a barrier to cloud adoption, but in fact cloud providers have many tools to ease compliance with regulations and industry standards. They can help you maintain compliance with the least amount of resources. […]
November 15, 2016
Via: Dark ReadingSecurity operations centers (SOCs) are not as ubiquitous and well-run as you’d think. Gartner research has found that by 2019, only 50% of large and midsized companies will conduct security work from a SOC, and that’s up from 15% in […]
September 2, 2016
Via: CSO OnlineWomen are underrepresented in every industry, at every level of companies. Even more discouraging, a report from the Wall Street Journal suggests that there are significantly less women in the higher ranks of companies, indicating that growth of a female […]
August 23, 2016
Via: Help Net SecurityNew vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA 2016, Tim White, Director of Product Management at Qualys, talks about Qualys ThreatPROTECT, a […]
August 2, 2016
Via: Security IntelligenceAccording to the Ponemon Institute’s 2015 “Cost of a Data Breach Study,” a typical organization of 15,000 employees can fall victim to 1,764,121 security incidents per week. Worryingly, only approximately 100 of these breaches are detected. That’s just one part […]
August 1, 2016
Via: Security IntelligenceYou’ve heard the saying, “You don’t know what you have until it’s gone.” I think that wisdom applies nicely to the overall value that system administrators bring to their employers. Since July 29 is System Administrator Appreciation Day, today is […]
May 25, 2016
Via: Dark ReadingThe information security team is often seen as the department of “No.” At best, it’s viewed as the department that impacts productivity and drives down employee satisfaction. Take the simple task of an employee getting access to business resources to […]
May 6, 2016
Via: Security IntelligenceSuppose you’ve recently bought a piece of land and you’re interested in building a house on it. Whether you are acting as architect, general contractor, project supervisor or all of the above, the first step would be getting your hands […]
Access control, Privacy protection
March 28, 2016
Via: Help Net SecurityA recent study shows some terrifying results: banks in the U.S. often have less secure password policies in place than do social media websites. Specifically, the study found that 35 percent of the test group appear to have a significant […]