The National Institute of Standards and Technology (NIST) today released its Preliminary Cybersecurity Framework after having missed the initial October 10 deadline for the draft to be posted for review and commentary
Browsing: Strategy and Planning
To support the start of the UK’s “Get Safe Online Week”, part of Cyber Security Awareness Month, GlobalSign is publishing some useful information to benefit today’s ever increasing online consumer community.
Dave Anderson, Senior Director, Voltage Security, explains how organisations can overcome a common barrier to cloud computing adoption
Gartner last month released its “Five styles of Advanced Threat Defense” framework which attempts to update a layered defence model for enterprises to be able to protect against APTs or ATAs.
We’ve all heard the old saying: “If you fail to plan, you’re planning to fail.” Of course, it’s true: and from a security viewpoint, it’s also interesting to turn the cliché on its head.
Security is a major concern as BYOD increases. We’re all familiar with the problems arising from data stored on unsecured devices which then go missing, but what about unsecured network access?
Japan has an 80,000 shortfall in infosec professionals, and needs to provide extra training for more than half of those currently in the industry, if it’s to protect key IT systems from attack, according to the government.
When companies relied on the static analysis of binaries to determine whether a program is malicious, attackers came up with a simple way to bypass defenses: obfuscating the code with packers and other techniques.
Several statistics gathering engines on the web reveal an interesting picture. Content management systems (CMS) have become far more popular in the last couple of years.
This whitepaper by Portcullis Labs discusses a number of attack vectors for SSL and TLS, offering real world examples where it can.
Please click on the image to download your FREE copy now.