The IT staff can play a crucial role in transitioning today’s workers away from old-school passwords to modern day passphrases.
Browsing: Threat Intelligence
We still have a long way to go with BYOD, and there is a massive hill with regards to educating the public about using unsecured WiFi environments.
Disaster recovery (DR) technologies should be considered an integral component of multilayered protection for both your data and your uptime.
John Walker comments on common user behavior with respect to mobile devices and suggests that these tools deserve more respect and security awareness.
By taking stock of their human and technological resources, security teams can determine if they are prepared to effectively respond to APTs.
Lucas Zaichkowsky, Enterprise Defence Architect at AccessData, comments on the CHS hack that compromised 4.5 million patients’ data.
When we start mapping our efforts to the attacker’s infiltration steps (known as the cyber kill chain), we can focus our incident response efforts.
Experts in the information security field comment on the Supervalu data breach.
At Black Hat, ForeScout Technologies announced new ControlFabric integrations with Rapid7 Nexpose and ThreatStream.
A group of security experts in the information security industry comment on the recent CyberVor attack.