Advertisement
Top

Tag: Challenges


Network security

Top compliance and risk management challenges for financial organizations

December 6, 2019

Via: Help Net Security

Notable regulatory compliance and risk challenges remain high in a number of key areas for U.S. banks and credit unions, according to the results of a Wolters Kluwer survey. Rising risk challenges for financial organizations This year’s survey generated a […]


Hacker, Threats & Malware

When it Comes to Securing Your Environment, Think Like an Attacker

December 4, 2019

Via: Security Week

We will soon be entering a new decade of the cybersecurity battle, but many of the same challenges remain. Organizations continue to face threats from all angles, security postures haven’t evolved to be more predictive and proactive, and there are […]


Cloud security

CISO challenges and the path to cutting edge security

December 11, 2018

Via: Help Net Security

Zane Lackey is the co-founder and CSO at Signal Sciences, and the author of Building a Modern Security Program (O’Reilly Media). He serves on multiple Advisory Boards including the National Technology Security Coalition, the Internet Bug Bounty Program, and the […]


Access control

PCI Security Standards Council Issues Guidance For E-Commerce Security

February 2, 2017

Via: Dark Reading

Update educates merchants on payment security challenges and significance of encryption.  The PCI Security Standards Council has released an update of its 2013 guidance on e-commerce that offers practical advice to merchants on understanding and maintaining a secure e-payment platform. […]


Application security

What developers and managers are saying about application security challenges

January 4, 2017

Via: Help Net Security

Despite showing moves toward earlier and more frequent security testing throughout the development process, there are still hurdles development and security teams must overcome when it comes to securing applications, according to Veracode. According to the survey, 40 per cent […]


Privacy protection

IT Priorities 2017: Buyers look for network privacy, visibility tools

December 12, 2016

Via: Computer Weekly

The 2017 Computer Weekly/TechTarget IT Priorities survey shows growing interest in network privacy, security and management, but SDN and NFV are still lagging. An uncertain geopolitical environment, an ongoing outbreak of data breaches, high-profile distributed denial of service (DDoS) attacks […]


Network security

The Critical Infrastructure Attack Surface: Assessing Its Breadth, Fragility, Threats and Defenses

December 12, 2016

Via: LogRhythm

The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands. It caused many to question our definition of critical infrastructure and the best way to ensure crucial functions […]


Cloud security

Cloud Risks Pose the Latest Security Education Challenge

May 5, 2016

Via: Security Intelligence

The cloud wars are over, and of course the cloud won. We don’t just deal with the cloud; when it comes to IT, we pretty much live in the cloud. The most obvious result is enormous power at our fingertips […]


Cyber-crime

Big Data Opportunities Need Big Data Security

November 25, 2015

Via: Security Intelligence

The adoption of big data analytics is rapidly growing. If you don’t get ahead of the curve, there’s big potential for big problems; but if you do plan ahead, there are big opportunities to successfully enable the business. You might […]


Cloud security

IT priorities are changing: Cloud-first strategy to rise

November 6, 2015

Via: Help Net Security

Bitglass conducted an survey of nearly 100 IT leaders attending the Gartner Symposium IT Expo in Orlando, Fla. to better understand their top challenges for 2016, and how they plan to address them. Among the notable findings, 55 percent of […]


Editorial, Security

Security Trends That Dominate 2015

August 5, 2015

Via: Russel Edwards

The latest types of security exploits target connected cars and airplanes. Attacks aiming the essential systems of these kind of machines take the idea of cyber warfare to a whole new level. Since firewalls cannot offer the needed degree of […]