PhishMe has assembled some tips to provide a roadmap for establishing a security behavior management program that measurably improves security posture.
Browsing: Strategy and Planning
Introducing 2FA as a simple username and password combination is no longer enough to guarantee an adequate level of security.
Databarracks has revealed a significant disparity between organisations’ attitudes and approaches to business continuity (BC) and disaster recovery (DR).
People solve problems all the time, but when it comes to risk management, relying on a person is no substitute for a process.
Yonni Shelmerdine of Lacoon identifies a number of critical takeaways with respect to the iCloud hack.
IoT provides the opportunity for managed services to dramatically improve their service interactions, gain more information about the users
What would happen if the very Android devices managed by the MDM were to be successfully compromised? Could this mean the end of BYOD?
Given the risks of suffering a breach, it is important that businesses work to develop a culture that gives priority to keeping their information secure.
Jaime Blasco, Director of AlienVault Labs, discusses Archie, an Exploit Kit that was first discovered by William Metcalf at EmergingThreats
Dimension Policy Map aggregates disparate information about policies, interfaces, applications and related traffic flows, and presents it in a simple