Information Security

Information Security news, information, and how-to advice


cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

cybersecurity budgets

KPIs for managing and optimizing devsecops success

CISOs need to make devsecops a priority. These KPIs can help align both security and nonsecurity stakeholders as to where, why, and how security fits into the process

man business suit newspaper [by Olu Eletu - CC0 via Unsplash]

This tech would let Facebook and Google stop fake news now

The financial services industry already has antifraud tools that, coupled with established spam detection tools, could put an end to Russian efforts to influence our elections

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

fivetotry nov20 gameofthrones

Winter is coming. Protect your content kingdom

The struggles that HBO is facing are prime examples of a breach of confidentiality by a trusted user or group who bypassed multiple security controls to leak sensitive intellectual property

security software programmer primary

3 reasons cloud-native is the next evolution in enterprise security

Cloud-native is the next evolution for security in the enterprise, because it gives every organization the ability to use the same tools and processes used by modern fast-moving organizations, such as Airbnb, Google and Facebook. It’s...

securiy companies watch

Cybersecurity startups to watch

CBInsights names the up-and-coming companies, called ‘Cyber Defenders,' that are pioneering technology with the potential to transform cybersecurity

Blockchain graphic

Blockchain: 'Overhyped' buzzword or real-deal enterprise solution?

IT vendors are rolling out blockchain-based capabilities, often in response to high levels of customer interest, but experts disagree about whether it’s a good fit for enterprises

data security strategist

What it takes to become a data security strategist

Data security strategist is a fast-growing career, and one that will get even hotter as data from AI and IoT inititiatives pours into enterprises

data breach hacker

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

81p5l6fqewl. sl1500

38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

hidden door

How to respond to device and software backdoors inserted or left by vendors

Here are the challenges to finding them, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

One of the biggest changes on the internet in the four years since his revelations about NSA surveillance is the growth in the use of encryption

01 plan

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

Google Cloud sharpens its enterprise strategy

Google used to rely mainly on its technical bona fides to sell its cloud, but now it's meeting customers halfway with new enterprise-friendly capabilities and support

diy robot

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks

01 respond attack

9 secrets to cyberattack survival

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement

3 bitcoin

Would killing bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts say that doing away with the cybercurrency would only force cybercriminals to find another anonymous avenue to extort money

Load More
You Might Also Like