Top

Category: Security


Security

Phish? Everyone’s on the hook.

December 14, 2017

Via: Cisco Blog

There’s no doubt that general awareness for cybersecurity has been on the rise in recent years. The importance of using strong passwords, for example, is now common knowledge. But one very popular and effective threat continues to fly largely under […]


Monitoring&Analysis, Security

DDoS protection, mitigation and defense: 7 essential tips

December 14, 2017

Via: CSO

DDoS attacks are bigger and more ferocious than ever and can strike anyone at any time. With that in mind we’ve assembled some essential advice for protecting against DDoS attacks.1. Have your ddos mitigation plan ready Organizations must try to anticipate […]


Monitoring&Analysis, Security

It’s all just fun and games…until it’s not

December 12, 2017

Via: CSO

Ever wonder what industry faces the highest number of distributed denial of service (DDoS) attacks? Logic would dictate it’s finance, because of all that money; or healthcare, with all of the confidential patient information. Wrong! It’s online gaming. Online gaming […]


Monitoring&Analysis, Security

AI, ML – is it all just BS?

December 12, 2017

Via: CSO

Read a security related press release or been to an event recently? You’ve no doubt been wondering how you managed to do your job all this time without Artificial Intelligence (AI) or Machine Learning (ML). Do these technologies really live […]


Monitoring&Analysis, Security

Build it right with NIST’s Cybersecurity Framework

December 12, 2017

Via: CSO

Thomson Reuters will also offer access to Visible Alpha’s Oneaccess Broker Vote application within Eikon, which allows users to populate recommended benchmarks based on weighted interactions data to understand the value resulting from all research relationships, and to Visible Alpha’s […]


Monitoring&Analysis, Security

Container security tips for the C-level, from a CISO

December 11, 2017

Via: CSO

Container security has been gaining steam over the last few years. Many enterprises are experimenting with containers, and a recent 451 report showed that 25 percent of companies have already implemented the technology. While IT teams and software developers are […]


Monitoring&Analysis, Security

Google Advanced Protection Program protects high-risk users from hacks

December 11, 2017

Via: CSO

Instead of focusing on all users, Google set its sights on the minority who need the strongest security measures and today announced the launch of its Advanced Protection Program. The program goes beyond two-step verification by requiring a physical piece […]


Monitoring&Analysis, Security

Cyberinsurance shifts to the mainstream

December 8, 2017

Via: CSO

With cyberattacks growing more common and ferocious, now is a good time to look into cyberinsurance. Be prepared to ask a lot of questions before making a decision. The market for these new-fangled policies is still young, which means coverage […]


Monitoring&Analysis, Security

Software security’s culture code

December 8, 2017

Via: CSO

One of the toughest technical challenges in software security isn’t even technical. It’s cultural. Developers are responsible for making the code secure but, in many cases, have not lived up to their responsibility. I believe creating effective software security programs […]


Monitoring&Analysis, Security

When big data gets personal…and cloudy

December 8, 2017

Via: CSO

According to IBM, we create 2.5 quintillion bytes of data per day. That is a lot of really big data. And big data is getting bigger. It is becoming even more ubiquitous as our Personally Identifiable Information (PII) not only forms […]