Great "Defense-in-Depth" InfoGraphic
Michael Fisher shared this on Twitter. Very nice and gives an immediate overview of #CyberSecurity Defense-in-Depth with all the areas it encompasses. Here it is:
Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.
Michael Fisher shared this on Twitter. Very nice and gives an immediate overview of #CyberSecurity Defense-in-Depth with all the areas it encompasses. Here it is:
The need for improved detection, response and privacy is driving the demand for security products and services in response to security risks, business needs and industry changes, Gartner ...
It’s not good to be in Healthcare IT these days, judging by the latest data. With over 3 million records put at risk by both insiders and external attacks in Q2, healthcare orgs need to ...
Whether you realize or not, your employees are a critical part of your layered defense against phishing attacks, malware, ransomware, and more. So why aren’t they concerned?
Cybersecurity insurers, faced with growing demand, are looking for new ways to better measure their risks, says Aleksandr Yampolskiy, CEO of SecurityScorecard. So some are moving toward ...
The ransomware plague is not letting up and rapidly getting more technically sophisticated. New strains are popping up every month, using innovative methods to spread. Worse, the ransom ...
Daniel R. Stoller at Bloomberg Law had an excellent observation about the risks of phishing related to general crime policies. Here is a short excerpt and the whole article is warmly ...
PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security ...
Lance Spitzner said: Eat breakfast, it may be the last meal you get that day. Schedule the most important meetings in the morning. RSA gives you a back-pack. Don't use it at the con, ...
We were just made aware of this very interesting map created by CBInsights. It lists the most well-funded cyber security companies in each US State as of Feb 2, 2018. To our pleasant ...
Kevin Townsend wrote a great article about AI in SecurityWeek, looking at the current state of affairs and the expected near future, based on a recent important scientific paper titled: ...
Those who said they were willing to sell the data would do so for as little as between $500 and $1,000. Alexandia Wilson at HealthLeadersMedia had some disconcerting news. "Patients trust ...
Securities and Exchange Commission Chair Jay Clayton warned today insider trading by executives from undisclosed hacks and weak protections can pose cyber security risks to the reputation ...
Few organizations are highly confident in their ability to manage the risk of a cyber-attack, despite viewing cybersecurity as a top risk management priority, according to a survey ...
Shawn Tuma is an attorney with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Attorney at Scheef ...
The UK government has warned that Britain's most critical industries must boost their cybersecurity or face potentially hefty fines under the EU's Networks and Information Systems ...
In the first quarter of 2018, after 7 years of helping our customers to enable their employees to make smarter security decisions and having reached the milestone of 15,000 customers, we ...
Ever heard: "If it was easy, everyone would do it" ? Creating a better security culture in your organization has a few challenges. Let's have a look at them, see how you can overcome ...
OK, 2018 has just started and it has totally borked all networks in the whole world. That's a fine mess we're in to start off the year. :-) Meltdown and Spectre are CPU hardware design ...
Excellent book about InfoSec that has everything you need to know and nothing you don't. A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using by ...