1. Articles in category: Cyber Security

    49-72 of 147 « 1 2 3 4 5 6 7 »
    1. BrandPost: Risk = Likelihood x Impact

      For businesses, technology risk is governed by one equation:

      Risk = Likelihood x Impact

      This means that the total amount of risk exposure is the probability of an unfortunate event occurring, multiplied by the potential impact or damage incurred by the event. You can’t eliminate technology risk altogether. But with the right plan, specialized expertise, 24/7 automation, and a commitment to long term success, you can minimize it. The math is simple.

      Read Full Article
    2. Suspected spycraft, not hacktivism, swirls around alleged NSA hack

      Not even the National Security Agency is immune to carelessness, according to noted leaker Edward Snowden. The agency’s operatives can get lazy, and sometimes they leave behind files inside the servers they’ve hacked. That could explain how an anonymous group managed to obtain hacking tools that may belong to the NSA. The files are up for auction to the highest bidder, and allegedly include cyber weapons that rival the Stuxnet computer worm.

      Read Full Article
    3. Securing company data during offboarding

      As cyberattacks have become more frequent and severe, many businesses have redoubled their security efforts, determined to reduce their exposure to risk wherever possible. However, several major vulnerabilities have gone unaddressed despite IT professionals’ repeated warnings. This disconnect between IT and management has hampered more comprehensive security efforts and effectively created cybersecurity “blind spots.” Unsurprisingly,  CompTIA's Practices of Security Professionals report found that less than half of firms, regardless of size, are completely satisfied with their current security environment.

      Read Full Article
    4. The four cybersecurity terms everyone is talking about at Black Hat

      As the saying goes, knowledge is power. And when it comes to cyber security knowledge, every year thousands descend on Las Vegas for the Black Hat conference to acquire as much of it as they can. For some, it’s an opportunity to share research and to demonstrate the fragility of computing systems. For others, it’s a chance to show off new tools and technologies to defend against threats. 

      Read Full Article
    5. The Brave New World Of Cloud Application Security

      As businesses continue their flight to the cloud, their concerns about security are changing. The cloud can offer companies better security than their own data centers — but only if they understand how to manage the responsibilities that come with it. When it comes to the physical environment, for small and mid-sized businesses, the cloud often provides better security than an on-premise data center, said Paul Hill, a senior security consultant with SystemExperts, an IT compliance and security firm.

      Read Full Article
    6. Hacker attacks following Verizon purchase of Yahoo

      Reports on the web suggest that a hacker called Peace, believed to have previously been part of a Russian hacking syndicate, is selling Yahoo user account details for £1,380, using bitcoin. While some observers have said the stolen login details are relatively old, dating back to 2012, many users do not change their password and login details and often use the same login across multiple web and social media sites.

      Read Full Article
    7. A CIO’s Biggest Security Challenge May Surprise You: Cloud Compliance

      More and more, cloud is everywhere in IT — and increasingly, throughout the business. Today, 72 percent of organizations have at least one application in the cloud or a portion of their computing infrastructure in the cloud, according to IDG’s Cloud Computing Survey 2015, while 56 percent of organizations are still identifying IT operations that can move to the cloud.

      Read Full Article
    8. How predictive analytics discovers a data breach before it happens

      Cybersecurity experts are constantly trying to keep pace with changes in the volatile landscape of IT security. Despite sophisticated tools and solutions, every IT security officer knows that data breaches eventually happen — and they usually go undetected for a long time. What if we could stay ahead of threat actors and predict their next attack before they take their first…

      Read Full Article
    9. SMS-based two-factor authentication may be headed out the door

      SMS messaging for two-factor authentication might become a thing of the past. A federal agency is discouraging its use. The National Institute of Standards and Technology is pushing for the change. The latest draft of its Digital Authentication Guideline, updated on Monday, warns that SMS messages can be intercepted or redirected, making them vulnerable to hacking.

      Read Full Article
    10. Skills gap leaves firms at risk from cyber attacks

      Firms are becoming increasingly vulnerable as a result of employees lacking necessary IT security skills. Research shows a skills shortage in the security space is leaving firms exposed to cyber attacks, with 34% of firms planning to increase their staff to respond to threats they are facing. In response to increasing cyber security threats, some firms are also employing a chief information security officer (CISO) to manage IT security processes.

      Read Full Article
    11. How Blockchain, cloud, and other emerging technologies are changing cybersecurity

      It can be easy to lose sight of the innovation in the cybersecurity industry amid frequent negative news about breaches and increasingly sophisticated hackers. The reality is that many disruptive innovations are beginning to gain traction and could very well change the way business is conducted. Here are five key cyber developments to keep on your radar

      Read Full Article
    12. IDG Contributor Network: 4 security practices mobile and remote workforce must follow

      As working practices become more casual, comfortable and collaborative, organizations need to tighten their belts to ensure data security.If you find your mobile and remote workforce expanding, you need to ensure that your security practices expand with it. Automatic and secure passwords generated by your IT staff will no longer cut it; newer and more secure methods are being introduced to ensure that your employees and their devices remain safe from prying eyes and security threats.

      Read Full Article
    13. Killing the password: FIDO says long journey will be worth it

      The FIDO (formerly Fast Identity Online) Alliance is out to kill the password. It wouldn’t seem to be a tough sales job. There is little debate among security experts that passwords are a lousy, obsolete form of authentication. The evidence is overwhelming. Most people in spite of exhortations to use long, complicated passwords, to change them at least monthly and to avoid using the same one for multiple sites, don’t.

      Read Full Article
    14. Cisco aims to simplify security

      Digital transformation. It's a reality that few companies today can escape. For some, the process is well underway. For many others, it's an oncoming inevitability. Whichever side of the gap your organization is on, you're probably facing a "security effectiveness gap" as the process brings more users, devices and applications online, creating an ever-expanding attack surface.

      Read Full Article
    15. Google starts experimenting with quantum-secure connections in Chrome

      If quantum computing ever lives up to its promise (and that’s still a big ‘if’ at this stage), somebody could use this technology to retroactively break any communications that were encrypted with today’s standard encryption algorithms. To guard against this, Google today announced that it will now start experimenting using post-quantum algorithms to encrypt the connections between the experimental Canary version of Chrome and some of its services.

      Read Full Article
    49-72 of 147 « 1 2 3 4 5 6 7 »
  1. Popular Articles