Tags: cybersecurity

What Is the NIST Cybersecurity Framework?

Learn what the NIST Cybersecurity Framework is, who it impacts, and how to implement it in Data Protection 101, our series on the fundamentals of information security. Set forth by the National Institute of Standards and Technology under the United States Commerce Department, the Cybersecurity...
Read 0 Comments

Cybersecurity Vendor Selection: What Needs to Be in a Good Policy

Operating a company in the modern enterprise landscape requires a reliance, to some degree, on third-party vendors. It's unavoidable. But the addition of each new vendor brings with it a certain amount of risk. Starting small is key. Company leaders should work with their CISO or CSO to determine...
Read 0 Comments

TNS Guide: How to Manage Passwords and Keep Your Online Accounts Secure

Massive data breaches over the past several years have shown that you can’t trust online service providers to keep your account information secure. So, if you haven’t done this until now, it’s time to carefully consider what and how you share with such companies, starting with your password. First...
Read 0 Comments

7 Things to Know About the Changing Security Landscape

If you’re a hacker or a security company, chances are you’ve had a very good year. If you’re one of the enterprises that lost millions because of malware, then not so much. This year saw dozens of massive data breaches — and 2017 isn’t over yet. It also saw record investments in security startups,...
Read 0 Comments

Operationalizing Cybersecurity

Operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows.  Just like organizations can’t achieve safety; they cannot achieve cybersecurity.  Therefore, having a well-defined organizational cybersecurity strategy is essential in keeping organizational...
Read 0 Comments

What Women in Cybersecurity Really Think About Their Careers

For once, some good news about women in the cybersecurity field: A new survey shows that despite the low number of women in the industry, many feel empowered in their jobs and consider themselves valuable members of the team. The newly published "Women in Cybersecurity:  A Progressive Movement"...
Read 0 Comments

China Adopts Cybersecurity Law in Face of Overseas Opposition

China adopted a controversial cyber security law on Monday to counter what Beijing says are growing threats such as hacking and terrorism, but the law triggered concerns among foreign business and rights groups. The legislation, passed by China's largely rubber-stamp parliament and set to take...
Read 0 Comments

The H Factor – Why You Should Be Building “Human Firewalls”

It is often the illusive “H Factor” – the human element – that ends up being the weakest link that makes cyber-attacks and data breaches possible, sometimes even more so than hackers exploiting zero-day system vulnerabilities or employing new malware.  According to the 2016 Verizon DBIR, human...
Read 0 Comments

Linux.Lady Trojan Turns Linux Servers into Bitcoin Miners

A NEW TROJAN targeting Linux servers has been discovered in the wild, exploiting servers running the Redis NoSQL database to use them for bitcoin mining. Up to 30,000 Redis servers may be vulnerable, largely because careless systems administrators have put them online without setting a password....
Read 0 Comments

DARPA Cyber Grand Challenge Ends With Mayhem

DARPA's Cyber Grand Challenge pitted machine against machine in an effort to find the best in autonomous computer security. In the end, Mayhem was the big winner. After three years of planning and lead-up contests, the finals of the Defense Advanced Research Projects Agency's Cyber Grand Challenge...
Read 0 Comments

Pages

Click Here!