Top

Tag: best practices


Application security, Cloud security

A Brief History of Containerization: Why Container Security Best Practices Need to Evolve Now

May 10, 2019

Via: Security Intelligence

Think about a revolutionary invention. What’s the first thing that comes to mind? Maybe it’s the advent of the internet, or perhaps your brain skipped all the way back to the steam engine. When asked that question, how many people […]


Network security

Stay Ahead of the Growing Security Analytics Market With These Best Practices

January 16, 2019

Via: Security Intelligence

As breach rates climb and threat actors continue to evolve their techniques, many IT security teams are turning to new tools in the fight against corporate cybercrime. The proliferation of internet of things (IoT) devices, network services and other technologies […]


Network security

SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks

October 2, 2018

Via: Security Intelligence

Data breaches that compromise hundreds of thousands — or millions — of records tend to grab the most headlines, but small- and medium-sized businesses (SMBs) are far from immune to cyberattacks. SMB security is full of holes, and these vulnerabilities […]


Network security

5 SaaS Security Best Practices for Developers

July 20, 2018

Via: Aberdeen

The majority of applications being used today are SaaS (Software-as-a-Service) solutions accessed via the cloud. The convenience of apps such as Google’s G-Suite, Salesforce, Basecamp, and others brings with it the challenge of securing all the data being transmitted by […]


Cloud security

5 Tips for Integrating Security Best Practices into Your Cloud Strategy

June 19, 2018

Via: Dark Reading

Do ‘cloud-first’ strategies create a security-second mindset? Too often, I hear system administrators tell me that their organization’s cloud-first strategy is jeopardizing security. With each new software-, infrastructure, and platform-as-a-service adopted by line-of-business users or within enterprise IT, security seems […]


Access control

Who Am I? Best Practices for Next-Gen Authentication

November 16, 2017

Via: Dark Reading

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords. There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn’t hesitate to recount all […]


Phishing

Security Think Tank: Phishing awareness a key element of a security positive culture

October 4, 2016

Via: Computer Weekly

Although many people are aware of phishing attacks, there are still a large number of successful compromises. Phishing attacks counterfeit communications from a legitimate/trustworthy source to mislead recipients into revealing sensitive information. Email containing malware-infected links is the main means […]


Data loss

No Business Is Too Small for SMB Cybersecurity

September 22, 2016

Via: Security Intelligence

Smaller businesses, like the HVAC company that caused the Target penetration in 2013, often think they are too small to be security targets, but SMB cybersecurity can have big implications. Size doesn’t matter as long as your firm has something […]


Wireless security

Industrial IoT is inching toward a consensus on security

September 21, 2016

Via: CSO Online

IoT is complex, fast-growing and often intertwined with systems that govern things like water and power. That makes IoT security a critical requirement, but it’s one that’s not necessarily well understood. The Industrial Internet Consortium, a group that includes some […]


Cloud security

Security scores for cloud companies on the way

September 20, 2016

Via: InfoWorld

Compromised vendor systems have led to several major data breaches recently. And sometimes, vendors get breached because of a partner’s lax security. A group of tech companies led by Uber are banding together as the Vendor Security Alliance to prevent […]


Privacy protection

The CSO password management survival guide

September 19, 2016

Via: CSO Online

By now we’re all well aware of what makes a bad password … it’s us. A glance at SplashData’s annual reporting on the world’s worst passwords shows just how laughably bad at creating passwords us humans really are. But what’s […]


Email security

Best Practices for Enterprise Email Security

July 1, 2016

Via: InfoSecurity Live

Email security is a major concern in enterprises where transmission and storing of email is snooped by the hackers. The only way to strengthen is to follow the best security practices with respect to the service providers. In the enterprise, […]


Security

Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine

December 14, 2015

Via: Help Net Security

Turn the Cyber Kill Chain against your attacker Created by Lockheed Martin, the “Cyber Kill Chain” model has traditionally been used to describe the evolving stages of a cyber attack. However, if this model is applied to internal security processes […]


Cloud security

Three Best Practices for Securing Your Cloud

September 25, 2015

Via: cloud-security

If your organization is like most, you’re likely using or considering cloud-hosted #applications and #infrastructure. Security in the cloud is just as important as security in on-premises IT environments, though it’s different in several important ways. There are many great […]


Cloud security

Best practices for ensuring compliance in the age of cloud computing

September 3, 2015

Via: cloud-security

When was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck … well, if not terror, then certainly groans in the […]