Tag "Security Threats"

Back to homepage
Software

12 Quick Ways to Secure Your Personal Data

Think about the many places your personal data lives – the documents that contain it, the businesses collecting it, the devices storing and sharing it, the websites and apps using

Software

Designing Employee Security Awareness Training That Works

Enterprises spend nearly $100 billion a year on cybersecurity, and despite sophisticated IT security defenses, one weak link – employees – remains a major vulnerability. Many attacks are stopped by firewalls, endpoint security

Industry Insights

Four tips for keeping security worries away this summer

As the summer weather heats up, so does the desire to cut out of the office early and finish the workday from the park, a local pub patio or maybe

Hardware/Network

5 Breakthrough Technologies to Combat Insider Threats in 2018

Insider threats are on the rise. When companies traditionally look outwards for security threats, they should be looking inwards towards their most trusted asset, employees. Employees have access to sensitive

Cloud

The benefits of mature cloud security strategies

Organizations that take a pragmatic approach to securing the use of user- and business-unit-led-cloud services realize appreciable business benefits compared with organizations that take more draconian, coarse-grained approaches. According to

Industry Insights

The Next Big Lesson for Security: Context is King

Imagine if every time someone saw a person carrying packages out of a house, they assumed it was a robbery and called the police. The police department would be overwhelmed

Hardware/Network

Threat modeling: What’s all the buzz about?

Keen observers will have noted an uptick in activity around threat modeling within the information security community recently with new tools being released and strategies and methodologies being discussed on

Hardware/Network

Machines and Humans Team up for Cyber Security

By Anabel Cooper – Blogger, Machines and Humans Team up for Cyber Security When it comes to computing high volumes of mathematical calculations, there’s no way a human can compete

Industry Insights

How employee behavior impacts cybersecurity effectiveness

A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links before verifying they lead to

Software

Beguiling Apple with Malicious Code

Nefarious actors who successfully exploit a newly discovered vulnerability in Apple code signing can potentially deceive third-party tools into believing their code is Apple approved. Today, the Okta Research and Exploitation (REX) researcher who uncovered