Employee activities that every security team should monitor
Next time you are at a cocktail party with a group of IT security professionals, try this icebreaker – “Which of the following user activities could open the door to a data …
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
Why everyone should care about two-factor authentication
In the age of BYOD, corporate employees and consumers alike have access to incredible computing power in the palms of their hands. With almost our entire digital lives …
Internet of Things: Rethinking privacy and information sharing
It is hard to imagine a world where the Internet of Things (IoT) is our collective “normal” – when our interaction with devices around us is so embedded in our lives, how we …
Top 3 trends in today’s threat landscape
Every day there seems to be a new malware threat that we hear about, from remotely controlling cars and medical equipment, to attacks on well-known security vendors such as …
Existing security standards do not sufficiently address IoT
A lack of clarity and standards around Internet of Things (IoT) security is leading to a lack of confidence.According to the UK IT professionals surveyed by ISACA, 75 percent …
When it comes to breaches, time is the biggest challenge
A new SANS report includes results of a survey that polled 430 security and risk professionals from the SANS community, all working in private and public sector organizations …
How to become a nightmare for cyber attackers
Chris Nickerson, CEO of Lares Consulting, has been a penetration tester for the last 15 year or so. He headed red teams targeting systems and environments known and unknown, …
Internet of Things: Connecting the security dots from application design to post-sale
The age of Internet of Things is upon us. While it’s still early days, Gartner predicts that by 2020, the Internet of Things will be made up of 26 billion connected devices …
Don’t sink your network
Too many of today’s networks are easy to sink. One attack pierces the perimeter, and all of the organisation’s most sensitive data comes rushing out. Soon after, their logo is …
How attackers attempt to infect organizations
A new report by Palo Alto Networks, based on data from more than 7,000 enterprises worldwide, showcases real-world trends in enterprise application usage and critical …
Applying machine learning techniques on contextual data for threat detection
The momentum behind cloud computing couldn’t be stronger as companies, governments and other organizations move to the cloud to lower costs and improve agility. However, you …