While it may be obvious that addressing vulnerabilities eats up the most time for IT security pros, what may surprise you is the source of those vulnerabilities.
Kacy Zurkus |
14 Sep |
Read more
Managing the daily updates and upgrades needed to keep the website secure demands a highly skilled administration team.
Kacy Zurkus |
26 Aug |
Read more
The Center for Internet Security in partnership with the Council on Cyber Security has partnered with Monster to create Cyber Comp X, a virtual community designed to engage cybersecurity talent.
Kacy Zurkus |
21 Aug |
Read more
Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged with identifying what is relevant.
Kacy Zurkus |
14 Aug |
Read more
Though enterprises were once tentative about using so-called bug bounty programs to detect vulnerabilities, researchers are proving to be effective and trustworthy partners in assessing security risks.
Kacy Zurkus |
08 Aug |
Read more
LAS VEGAS – Telesign, a mobile identity solutions provider, continued to educate the public about its free "Turn It On" Campaign – a step-by-step instructional guide to two-factor authentication (2FA) on some of the most visited websites – at this year's Black Hat security conference. Co-founder Ryan Disraeli says that based on Telesign's "Consumer Account Security Report," it's clear consumers want more security but don't know much – if anything – about 2FA.
Kacy Zurkus |
07 Aug |
Read more
Developing plans to protect your digital information and network while complying with state and federal regulations can be a legal challenge for any corporation. Is relying on in-house counsel enough, or should companies have a cybersecurity attorney on retainer?
Kacy Zurkus |
05 Aug |
Read more
With so many cloud service providers that run the gamut from first-rate to not well known, navigating the cloud territory can seem as daunting as hitching a cart to a horse and heading west. No, moving to the cloud is not the same as the manifest destiny that drove people out west, but both the cloud and the westward expansion promised great expectations.
Kacy Zurkus |
16 Jul |
Read more
Parents have plenty of things to worry about when they send their kids off to college: money, physical safety, their happiness, empty-nest syndrome, their future. Do they now have to worry about identity theft and data security, too?
Kacy Zurkus |
09 Jul |
Read more
The information security industry is hot right now, but it's hot because it's failing. The daily announcements about breaches and lost data confirm that criminals are winning the security battle, but how can InfoSec reposition itself in order to win the war?
Kacy Zurkus |
02 Jul |
Read more
Packing the suitcases and setting off on vacation doesn't necessarily mean that IT executives are able to completely disconnect while away from work, but they are enjoying more downtime. Though they still feel the need to check in at least once a day, more executives say that their staff are well equipped to deal with critical situations.
Kacy Zurkus |
23 Jun |
Read more
Though all vastly different in scale and impact, the breaches at the Office of Personnel Management (OPM), Sally Beauty Supply, Starbucks, Anthem, Adult Friend Finder, and Penn State teach valuable lessons and reminders about security vulnerabilities and the need to do more to protect against attackers.
Kacy Zurkus |
17 Jun |
Read more
Securing a network becomes more challenging when the enemies are deceptive, clever, and savvy snakes, but recognizing the gaps in their security strategies before the criminals do can help organizations minimize detection and response times.
Kacy Zurkus |
11 Jun |
Read more
No one wants their private information falling into the wrong hands, but this is especially true of the younger generation, as they lack the resources to address such a compromise directly, and parents often don't think to monitor their child's personal records or usage.
Kacy Zurkus |
02 Jun |
Read more
What do Shakespearean tragedies and security issues have in common? Both are overwhelmingly the result of human error. Othello is one Shakespeare greatest plays, and Iago is one of literature's first social engineers.
Kacy Zurkus |
20 May |
Read more