Advertisement
Top

Author: ITCurated


Editorial, Network security

How does digital security differ from cyber-security?

November 30, 2016

Via: Russel Edwards

Slowly, but firmly, digital security replaces cyber-security. Some may experience surprise or confusion. More articles, more companies’ resources and presentations use the new term instead of the traditional one. What is going on? How does digital security differ from cyber-security? […]


Cyber warfare, Editorial

How they never listen to the experts (cyber sustainability)

November 24, 2016

Via: Russel Edwards

Sustainability in cyber-security may seem like a made up notion, but it isn’t. We stumbled upon it in CSO Online’s article on how DDoS Dyn attacks could have been prevented. When putting things into perspective, cyber sustainability makes a lot […]


Editorial, Network security

Adaptive security, the smart way to protect systems

November 16, 2016

Via: Russel Edwards

MarketsandMarkets, as quoted by Help Net Security, recently reported that the adaptive security market will gain considerable traction in the next five years. This success comes from the need to defend networks and IT systems against advanced threats. The expected […]


Access control, Editorial

Next Generation Firewalls – a mandatory technology?

October 27, 2016

Via: Russel Edwards

Next Generation Firewalls, abbreviated NGFW, enforce network cyber security by bringing a modern solution to current threats. The upgraded hardware/software based protection system acts in detecting and/or blocking sophisticated attacks by reuniting more types of key assets. In fact, this […]


Application security, Editorial, Mobile security

What do you know on fuzz testing?

October 19, 2016

Via: Russel Edwards

Cyber-security nowadays is getting more and more competitive, and it certainly is a battlefield where companies can suffer losses of huge proportions when hit. Even zero day exploits can cost vast amounts of money if not remedied in time, and […]


Editorial, Network security, Virus & Malware

Is IT alert fatigue one of your concerns?

October 12, 2016

Via: Russel Edwards

Alarm or alert fatigue is much older than our current cyber-technology. It represents the state of de-sensitization to alerts due to their overwhelming frequency or number, and it was previously met in industrial environments. As the denomination suggests, individuals whose […]


Data loss, Editorial

Once breached, repeatedly breached – how to stop data loss

October 5, 2016

Via: Russel Edwards

Once a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ […]


Editorial, Privacy protection

Beveiligingscontrole – trying to elucidate a word

September 28, 2016

Via: Russel Edwards

As some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged […]


Editorial, Malware, Vulnerabilities

How risky is macro malware, after all?

September 21, 2016

Via: Russel Edwards

Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need […]


Cyber warfare, Editorial, Privacy protection

Forget all cyber-security worries (by using strong awareness policies)

September 15, 2016

Via: Russel Edwards

What should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational […]


Cyber warfare, Editorial, Vulnerabilities

Humans for cyber-security: are they a catastrophe or an asset?

August 18, 2016

Via: Russel Edwards

Ignorance is bliss. As much as it may have banked the wisdom of ages, this saying does not apply in cyber-security. Having your employees blissfully unaware of the risks, vulnerabilities and dangers lurking behind their interactions with technology can prove […]


Editorial, Network security, Wireless security

How anonymity networks could protect users from IoT risks

August 11, 2016

Via: Russel Edwards

In what anonymity networks are concerned, all discussions revolved so far around Tor, its characteristics, its Dark Web gateway providing quality and its crucial role in tracking criminals in a few famous cases. Now that MIT researchers developed the Riffle […]


Cyber warfare, Editorial

Hackers take on bug hunting and become tech heroes

August 4, 2016

Via: Russel Edwards

Although a lot of unflattering virtual ink has been consumed to characterize hackers and many alarming things have been said about their skills, it is however incontestable that these people are extremely gifted, IT-wise. Turning the hackers’ talent toward law-abiding […]


Editorial, Vulnerabilities

Security automation and psychology share risks: the recency bias

July 28, 2016

Via: Russel Edwards

The rate of information increase nowadays is unprecedented, making big data look like a virtual triangle-shaped bundle, whose base is continually growing larger as we speak. The older information lies somewhere beneath this immediate bunch of huge data, and this […]


Application security, Editorial, Identity theft

Do you know who might steal your healthcare data?

July 20, 2016

Via: Russel Edwards

Smartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our […]


Access control, Editorial, Privacy protection

Don’t become a social engineering victim – know your Facebook

July 13, 2016

Via: Russel Edwards

Managing a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, […]


Editorial, Network security

Network monitoring tools: take a walk down this lane for some of the best options

July 6, 2016

Via: Russel Howards

Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The […]


Cyber warfare, Editorial

Will cognitive cyber-security one day protect your data?

June 28, 2016

Via: Russel Edwards

Cognitive computing simulates the human thought process in an artificial intelligence (cognitive) environment. Teaching a computer how to use the type of unstructured information usually employed by security analysts requires tools such as data mining, pattern recognition, human-computer interaction or […]


Cloud security, Editorial

Hybrid cloud considerations: do you see enterprises being thrilled?

June 22, 2016

Via: Russel Edwards

When two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud. The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the […]


Cyber warfare, Editorial, Malware

Stopping online advertising fraud once and for all

June 16, 2016

Via: Russel Edwards

In late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, combating malware, fighting […]

View More  >