Top

Tag: Security


Threats & Malware, Vulnerabilities

Security Think Tank: Why and how cyber criminals exploit world events

April 6, 2020

Via: Computer Weekly

Cyber criminals, APT actors and others who pose a threat to businesses and individuals are impacted and influenced by world events just like the rest of us. However, they will also use these events, as well as cultural events, to […]


Cyber-crime, Malware

Cybercriminal group mails malicious USB dongles to targeted companies

March 27, 2020

Via: CSO Online

Security researchers have come across an attack where an USB dongle designed to surreptitiously behave like a keyboard was mailed to a company under the guise of a Best Buy gift card. This technique has been used by security professionals […]


Network security, Security

4 steps to build redundancy into your security team

March 24, 2020

Via: CSO Online

Avoid central points of failure or compromise. This fundamental tenet of information security applies not only to systems and networks, but to individuals during a time of pandemic. Key cybersecurity staff, more often than not, possess singular knowledge of an […]


Network security, Security

8 key security considerations for protecting remote workers

March 16, 2020

Via: CSO Online

Your boss just called and all your employees are mandated to work from home for the next two to three weeks due to the potential COVID-19 pandemic. What could go wrong? What risks are you now bringing to the firm? […]


Network security, Security

6 security metrics that matter – and 4 that don’t

March 12, 2020

Via: CSO Online

One of the most challenging executive tasks for CISOs is quantifying the success and the value of the cybersecurity function. Indeed, security leaders and their organizations have used a myriad of metrics over the years. Yet, many executives and board […]


Cyber-crime, Malware

Deloitte: 8 things municipal governments can do about ransomware

March 11, 2020

Via: CSO Online

The IT systems of the City of Durham and Durham County in North Carolina have been shuttered since a successful ransomware attack struck the municipalities on the evening of March 6. Although details are still sketchy, the North Carolina Bureau […]


Application security, Security

How Visa built its own container security solution

March 9, 2020

Via: CSO Online

Like many large enterprises, financial services giant Visa has embraced containerization technologies that enable companies to move from legacy monolithic apps to microservice-based application architectures that are easier to maintain, update and deploy at scale on cloud infrastructure. But splitting […]


Editorial

Security Measures & Compliance Practices for eSignatures

March 9, 2020

Via: Rachel Oldford

Electronic signatures are becoming increasingly popular in the modern era since more and more companies have started to notice their multiple benefits. Speed, one of the key advantages of this solution, is what often drives people’s interest in using digital […]


Access control, Network security, Security

Do you trust your admins? 5 tips to manage administrator access

March 4, 2020

Via: CSO Online

Trusting your administrators and outside consultants is a key part of the security process. But should you? I recently came across a story where an employee of a managed service provider (MSP) sold access to the client base. Years ago, […]


Editorial

5G Security Concerns for 2020 and Beyond

February 24, 2020

Via: Lawrence Malone

A new decade fresh with opportunity is upon us, along with new opportunities for cybercriminals to prove their skills.  Cybersecurity threats have become increasingly ingenious over the last couple of years. To think that it all started out as “phone […]