Evasium Flux - Notes tagged with SecurityBloggersNetwork
7

My take: how behavior monitoring can reduce workplace violence, protect sensitive data

My take:  how behavior monitoring can reduce workplace violence, protect sensitive data
Trident Trident 10 April, 2018
Priority Post Security Bloggers Network by bacohido on In Minority Report police use three mutated humans, called Precogs, who can previsualize crimes, to stop murders before they take place, reducing the Washington D.C. murder rate to zero. The Philli...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
6

Over 5 million payment cards compromised in saks, lord & taylor data breach

Over 5 million payment cards compromised in saks, lord & taylor data breach
Fuchsia Fuchsia 10 April, 2018
Data Security Priority Post SBN News Security Bloggers Network Threats & Breaches by Luana Pascu on Russian hackers known as the JokerStash syndicate or Fin7 were selling on March 28 on the dark web payment card data stolen from over 5 million custom...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
5

Foreign or domestic: does it matter where your technology is made?

Foreign or domestic: does it matter where your technology is made?
Nikita Nikita 10 April, 2018
Cybersecurity Data Security Featured Security Boulevard (Original) Spotlight by Christopher Burgess on “What’s under the hood?” is a question normally associated with the automotive industry, but of late it has woven its way into the national security ...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
8

Podcast: why companies need a strategy to manage compliance, now more than ever

Podcast: why companies need a strategy to manage compliance, now more than ever
Dext Dext 10 April, 2018
Priority Post Security Bloggers Network by bacohido on Businesses are embracing the public cloud at an accelerated pace — and for good reason. By tapping hosted services,  companies of all sizes and in all verticals are finding fresh, dynamic ways to e...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
10

Seven steps toward bridging the cybersecurity skills gap

Seven steps toward bridging the cybersecurity skills gap
Dext Dext 10 April, 2018
Priority Post Security Bloggers Network by Ericka Chickowski on Building an effective cybersecurity team is no mean feat. Hiring managers struggle to find experienced talent today and according to the most recent figures from ISACA, one in three orga...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
8

20 critical security controls: control 9 – limitation and control of network ports, protocols, and services

20 critical security controls: control 9 – limitation and control of network ports, protocols, and services
Nikita Nikita 10 April, 2018
Data Security Priority Post Security Bloggers Network by Travis Smith on Today, I will be going over Control 9 from version 7 of the CIS top 20 Critical Security Controls – Limitation and Control of Network Ports, Protocols, and Services. I will go thr...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
7

What do you wish osquery could do?

What do you wish osquery could do?
Nikita Nikita 10 April, 2018
Priority Post Security Bloggers Network by Lauren Pearl on Welcome to the third post in our series about osquery. So far, we’ve described how five enterprise security teams use osquery and reviewed the issues they’ve encountered. For our third post, we...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
8

Ransomware named most prevalent malware in verizon’s 2018 dbir

Ransomware named most prevalent malware in verizon’s 2018 dbir
Fuchsia Fuchsia 10 April, 2018
Malware Priority Post SBN News Security Bloggers Network Threats & Breaches by David Bisson on Verizon Enterprise has named ransomware the most prevalent variety of malware in its 2018 Data Breach Investigations Report (DBIR). For the 11th edition of ...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
3

3d secure 2.0: what the protocol means for merchants

3d secure 2.0: what the protocol means for merchants
Trident Trident 10 April, 2018
Priority Post Security Bloggers Network Threats & Breaches by Rei Maoz on It’s no secret, many online merchants were reluctant to enroll with the original 3D Secure (3DS) 1.0 protocol due to unnecessary friction and the risk of card issuers/Access Cont...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
5

Saks fifth avenue, lord & taylor suffer payment card data breach

Saks fifth avenue, lord & taylor suffer payment card data breach
Trident Trident 10 April, 2018
Data Security Priority Post SBN News Security Bloggers Network Threats & Breaches by David Bisson on Saks Fifth Avenue and Lord & Taylor have both suffered a data breach involving customers’ debit and credit card information. The data breach became ap...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
5

Nykolas z updates global alternative dns speed test to include cloudflare (1.1.1.1)

Nykolas z updates global alternative dns speed test to include cloudflare (1.1.1.1)
Nikita Nikita 10 April, 2018
Cloud Security Security Bloggers Network by hrbrmstr on A while back, Medium blogger ‘Nykolas Z’ posted results from a globally distributed DNS resolver test to find the speediest provider (NOTE: speed is not the only consideration when choosing an alt...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
1

Security boulevard’s 5 most read stories for the week, march 26-30

Security boulevard’s 5 most read stories for the week, march 26-30
Trident Trident 10 April, 2018
Careers Cybersecurity Featured Governance, Risk & Compliance Most Read This Week Network Security News Security Boulevard (Original) Spotlight Threats & Breaches by Saleem Padani on A new week, a new crop of security stories. Last week,  U.S. infrastru...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
6

Speaking at gartner security summit 2018

Speaking at gartner security summit 2018
Nikita Nikita 10 April, 2018
Events Priority Post Security Bloggers Network by Anton Chuvakin on Gartner Security & Risk Management Summit 2018 is coming soon and here is my traditional blog post summarizing my speaking at this upcoming event (Washington, DC, June 4-7, 2018).“Stat...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
8

The forward secrecy chronicles, tls 1.3 hath garnered favor

The forward secrecy chronicles, tls 1.3 hath garnered favor
Dext Dext 10 April, 2018
Network Security Security Bloggers Network by Marc Handelman on Good news for mankind (and their AI mininions) traversing the web’s winding corridors of nattering decreptitude and bubbling evil, Transport Layer Security 1.3 has won approval by the Go...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
5

Can i replace ad with g suite™ directory?

Can i replace ad with g suite™ directory?
Fuchsia Fuchsia 10 April, 2018
Cloud Security Governance, Risk & Compliance Identity & Access Priority Post Security Bloggers Network by Natalie Bluhm on G Suite™  (formerly Google Apps) has become one of the most popular solutions on the planet over the last decade. With four m...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
11

My take: a breakdown of why spectre, meltdown signal a coming wave of ‘microcode’ attacks

My take: a breakdown of why spectre, meltdown signal a coming wave of ‘microcode’ attacks
Dext Dext 10 April, 2018
Priority Post SBN News Security Awareness Security Bloggers Network by bacohido on Hundreds of cybersecurity vendors are making final preparations to put their best foot forward at the RSA Conference at San Francisco’s sprawling Moscone Center next wee...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
5

Women in information security: sorene assefa

Women in information security: sorene assefa
Trident Trident 10 April, 2018
Priority Post Security Bloggers Network by Tripwire Guest Authors on In my last interview, I had the pleasure of speaking with Senior Security Analyst and Brakeing Down Security podcast host Amanda Berlin. Defensive security and blue teams are cool, an...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
4

The joy of tech®, ‘apple’s flexing it’s arms’

The joy of tech®, ‘apple’s flexing it’s arms’
Dext Dext 10 April, 2018
Humor Security Bloggers Network by Marc Handelman on Via the Facebook-spotting Comic Mages –  Nitrozac and Snaggy – at The Joy of Tech®!Share this:Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
4

The future of gpos

The future of gpos
Nikita Nikita 10 April, 2018
Cloud Security Endpoint Identity & Access Priority Post Security Bloggers Network by Vince Lujan on IT admins are concerned about the future of GPOs (Group Policy Objects). Why so? On one hand, GPOs are a powerful and sought after tool for managin...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
3

[new white papers] law firms face cyber security challenges around client confidentiality and due diligence

[new white papers] law firms face cyber security challenges around client confidentiality and due diligence
Nikita Nikita 10 April, 2018
Priority Post Security Bloggers Network by Devesh Panchwagh on Law firms and law departments have a fiduciary duty to protect client data. However, their mission to maintain the confidentiality of this sensitive information is challenged every day by e...
More details>>
Read on securityboulevard.com
Tags: Safety, SecurityBloggersNetwork
<< Previous Page 1 2 Next Page >>