Top

Category: Security


Monitoring&Analysis, Security

The state of cybersecurity at small organizations

August 16, 2018

Via: CSO

ESG recently completed a research survey of 400 cybersecurity and IT professionals working at small organizations (i.e. 50 to 499 employees) in North America. As you can imagine, these firms tend to have a small staff responsible for cybersecurity and […]


Monitoring&Analysis, Security

How to protect your infrastructure from DNS cache poisoning

August 16, 2018

Via: Networkworld Security

Domain Name System (DNS) is our root of trust and is one of the most critical components of the internet. It is a mission-critical service because if it goes down, a business’s web presence goes down. DNS is a virtual […]


Monitoring&Analysis, Security

Why you should consider crowdsourcing IT security services

August 15, 2018

Via: CSO

A crucial part of securing IT infrastructure, applications and services is asking independent white hat hackers to hack it. Hackers will try to break in regardless, so you might as well be part of the process to maximize the benefits. […]


Monitoring&Analysis, Security

AI in cybersecurity: what works and what doesn’t

August 15, 2018

Via: CSO

Let’s start by dispelling the most common misconception: There is very little if any true artificial intelligence (AI) being incorporated within enterprise security software. The fact that the term comes up frequently is largely to do with marketing, and very […]


Monitoring&Analysis, Security

Security Automation: Putting the odds ever in your favor

August 14, 2018

Via: Cisco Blog

It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wannacry […]


Monitoring&Analysis, Security

Getting to know you: How continuous identity and access management transforms secure access

August 14, 2018

Via: CSO

Every morning, like thousands of other people, I pick up a coffee at my local Dunkin’ Donuts on the way to the office. And every morning, I order the same thing, using the mobile app: a medium cup of French […]


Monitoring&Analysis, Security

The unintended consequences of GDPR

August 14, 2018

Via: CSO

GDPR has done a world of good. It has enabled us to understand digital privacy, empowered the consumer about her rights and put a steep monetary value on non-compliance. In a nutshell, the entirety of it can be summarized into […]


Monitoring&Analysis, Security

What is phishing? How this cyber attack works and how to prevent it

August 9, 2018

Via: CSO

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or […]


Monitoring&Analysis, Security

AI-powered DeepLocker malware attacks and face recognition Social Mapper tracking tool

August 8, 2018

Via: CSO

Meet Social Mapper, a facial recognition tool that searches for targets across numerous social networks, and the highly evasive and highly targeted AI-powered malware DeepLocker. Open-source Social Mapper face recognition tool The open-source intelligence-gathering tool Social Mapper uses facial recognition […]


Monitoring&Analysis, Security

Baby steps: building a cybersecurity strategy

August 7, 2018

Via: CSO

I have accomplished many challenging goals within my career. Rising to the second highest rank within my organization, redefining the manner in which our organization employs cyber professionals, and serving four combat tours of duty in the Middle East. The […]