Real words or buzzwords?: True Cloud

Read Ray Bernard explain what cloud services and cloud security actually mean on Security Info Watch : I first heard the words “True Cloud” at a security conference where Dean Drako, founder and owner of Eagle Eye Networks and owner of Brivo Systems, explained why he coined the term. Previously, there was no terminology to […]

Cyberthreats require global response, said ex-DHS head Chertoff

Former secretary of Homeland Security Michael Chertoff said international cooperation is needed to track down and prosecute cybercrimes. His comments came in the wake of a ransomware attack that has affected companies and governments around the world. Read why ex-director of Homeland Security says that cyber threats require a global and coordinated response on CNBC.

Does third-party security awareness training work?

Read Ryan Francis take a look at whether third-party security awareness training work on CSO Online : Being a security company, Rapid7 has to take special interest in making sure its 1,000 employees do not succumb to phishing and the like. At a recent CSO50 conference, speakers discussed their security awareness training. Read his full article […]

Dealing with a data breach

Read James P. Harris’ article about how companies can deal with a data breach on NH Business Review : Most people loathe the annual ritual of filing a tax return. Compounding that unpleasantness, a number of filers attempting to file a tax return only are notified by the Internal Revenue Service that someone else has […]

Why Continuous Vulnerability Assessment Is Essential

A continuous vulnerability assessment program should be baseline security requirement for all organizations, says Richard Bussiere, Technical Director APAC at Tenable Network Security. Read why Richard Bussiere of Tenable Network Security says that continuous vulnerability assessment is essential for effective cyber defense on Bank Info Security.

Public vs. private cloud: Why the public cloud is a real threat to security

Read Rich Banta explain why public cloud services are a threat to cyber security on Network World : The debate on public versus private cloud is a fierce one with advocates on both sides. Security experts, however, consistently fall in the pro-private camp. As a compliance and security expert, I have to agree. First, let’s be […]

Cybersecurity becoming a key boardroom agenda item

Read Narinder Purba’s article about how cyber security is becoming a key boardroom agenda item on We Live Security : An increase in the number of cyberattacks and growing awareness of the threat has made cybersecurity a key boardroom level agenda item. This is according to a new study from Marsh, which stated that there has […]

Deciphering Security Assessment Jargon

Read Brian A. McHenry explain what security assessment is on Information Security Buzz : Growing up, I think every kid heard a parent or teacher or coach tell them to sit or stand up straight. At the time, it was never quite clear why good posture was so important at the dinner table, in the classroom, […]

Protect Yourself with a Cyber Security Assessment

Read Stephen Nardone why says that it is necessary for companies to protect themselves with a cyber security assessment on CIO : The ugly truth is that your organization has either been the victim of a recent cyber security breach, or it will be. Despite spending billions on cyber security—$75 billion last year, growing to […]

How to perform a risk assessment

Read David Greer explain how companies can perform a risk assessment on CSO Online : Without a complete and thorough risk assessment including all its component parts (discussed herein), you might as well open all your data assets to unbridled exfiltration via Port 80 without any security checks at all. In the end, attackers and […]