8 top cyber-attack maps and how to use them

Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web’s most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used. Read […]

8 guiding principles for establishing an enduring cyber security program

Read Anthony Bargar’s article about eight guiding principles on which companies can establish a good cyber security program on Enterprise Innovation : We have all seen the headlines and read the stories about how organizations fail to apply basic security practices– and ‘somehow’ expose sensitive data, or suffer interrupted business causing chaos and a loss […]

Why you need to implement security controls across your environment

Read why Mirko Zorz says that companies need to implement security controls across their entire environment on Help Net Security : In this podcast recorded at Black Hat USA 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses the importance of security configuration assessment as part of a comprehensive vulnerability management program, and […]

Few own up to source code theft cybersecurity threats

Read why Joel Shore says that a very few companies own up the source code theft on Tech Target : Application security isn’t enough. Though we design software to limit a malicious attack from hijacking processing logic or stealing data, a glaring omission exists: security against stealing the program source code itself. Few will discuss the […]

Doing things right: Cloud and SecOps adoption

Read Zeljka Zorz’s article about cloud computing and SecOps adoption on Help Net Security : There is hardly an organization out there that isn’t planning or hasn’t already taken advantage of the cloud. And, according to Threat Stack CTO Sam Bisbee, there is hardly a technology-oriented organization anywhere on the small-business to-enterprise spectrum that isn’t […]

3 requirements of a successful long-term IoT strategy

Read Dean Hamilton’s article about the three requirements that companies should have for a successful Internet of Things strategy on Network World : Is your organization looking to get a piece of the Internet of Things (IoT) action? You’re not alone. IoT continues to draw lots of attention from companies across a multitude of industries, […]

Ransomware threat escalating, warns Europol

The No More Ransom initiative boasts 109 partners and 54 decryption tools covering 104 kinds of ransomware a year after it was set up to counter the still-growing threat of ransomware to businesses, governments and individuals. Read about the latest Europol warning to businesses about the escalating ransomware threats on Computer Weekly.

Many organizations still stymied by global privacy and security rules

While companies generally are aware of and intimidated by global privacy and data security regulations, many fail to properly understand and address necessary organizational changes to comply, according to a recent study by Experian Data Breach Resolution and Ponemon Institute. Read about the new study by Experian Data Breach Resolution and Ponemon Institute which reveals that […]

The data breach blame game

Read Nick Ismail’s article on the data breach blame game played by victim firms on Information Age : The cyber threat to UK business is significant and growing. Since February, when the National Cyber Security Centre was opened, the UK has been hit by 188 high-level attacks which were serious enough to warrant NCSC involvement, […]

Purple Team Assessment Service: A Collaborative Approach to Security Assessments

Read why Russel Van Tuyl’s says that companies should have a collaborative approach to security assessments on Security Info Watch : In the realm of information security, there is a growing movement to enhance security assessments with a more collaborative model of testing. This approach supplements the traditional penetration testing services that are the foundation of […]