System News
 1 2 3 4 5 6 7 8 9 10 11 next
Archived IT - Security Articles
21 Jun 2017
open to premium members only
Can't Remember Complex Passwords? No Need To Worry! [64470]
Business 2 Community, June 21st 2017

"The days of having to remember a series of complex passwords may soon be over!

So, what's changed, you ask? A draft of recommendations from the National Institute of Standards and Technology (NIST, www.nist.gov) is.

NIST is recommending three changes to password management for organizations. These changes are not mandatory (except for governmental agencies), but are worthy of consideration to help your employees perform more productively and ease some of the burden on your IT staff. You can read the full special publication on the NIST website; Appendix A provides a summary of information on the strength of memorized secrets..."
(Get More Information . .)

21 Jun 2017
open to premium members only
Experts Hash Out Next-Generation Cyber Defenses [64473]
GCN, June 21st 2017

"'There are only two types of networks, those that have been compromised and those that are compromised without the operator's awareness,' wrote James Scott, senior fellow at the Institute for Critical Infrastructure Technology, in a collection of essays on next-generation cyber defenses. The writers, ICIT fellows and industry security experts, voiced a common theme: Cyber threats continue to pervade government systems and no one solution is a cure-all..."
(Get More Information . .)

21 Jun 2017
open to premium members only
IT Departments Struggle To Secure All Endpoints [64476]
IT Business Edge, June 21st 2017

"How many endpoints are connected to your network?

Can you answer that question confidently? If you can't - and you aren't alone - then you can't be sure your endpoint security system is working as well as it could or should. And this is costing you, in terms of security and in real dollars.

A new Ponemon Institute and Absolute study found that traditional endpoint security approaches aren't working and costing organizations more than $6 million per year in poor detection, slow response and wasted time. One of the biggest problems, the study revealed, is the difficulty companies are having in identifying what they call the dark endpoints -- the rogue, out-of-compliance, or off-network devices that create blind spots. In turn, it is those endpoints that are most likely to create vulnerabilities that allow attackers to get through..."
(Get More Information . .)

20 Jun 2017
open to premium members only
Cybersecurity Fact vs. Fiction [64471]
Dark Reading, June 20th 2017

"Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly likely are such attacks?

Today's security industry is plagued with misinformation and FUD (fear, uncertainty, and doubt). Is your car safe to drive? Could that insulin pump you rely on give you a deadly dose? Could your power go off and never come back on? Is someone watching you through your smart home devices? Unfortunately, it's getting harder to identify the real threats from the exaggerated ones these days. I'd like to separate fact from fiction by addressing a few questions these headline-grabbing hacking tactics might prompt..."
(Get More Information . .)

20 Jun 2017
open to premium members only
Evaluating Artificial Intelligence And Machine Learning-Based Systems For Cyber Security [64472]
Help Net Security, June 20th 2017

"All indicators suggest that 2017 is shaping up to be the year of artificial intelligence and machine learning technology for cyber security. As with most trends in our industry, the available protection solutions range from elegantly-designed platforms to clumsily-arranged offerings. The big problem is that many enterprise security teams cannot always tell the difference.

I've spent the past few months digging in with a variety of vendors providing products and services in this important area. I've also been actively engaged with CISO teams of all shapes and sizes, trying to learn their experiences using AI and ML to deal with hackers and malware..."
(Get More Information . .)

19 Jun 2017
open to premium members only
How To Make Your Employees Care About Cybersecurity: 10 Tips [64474]
TechRepublic, June 19th 2017

"People are the largest security vulnerability in any organization. Here's some expert advice on how to make cybersecurity training more effective and protect your business...

Employees are a company's greatest asset, but also its greatest security risk.

'If we look at security breaches over the last five to seven years, it's pretty clear that people, whether it's through accidental or intentional introduction of malware, represent the single most important point of failure in terms of security vulnerabilities,' said Eddie Schwartz, chair of ISACA's Cyber Security Advisory Council..."
(Get More Information . .)

 
 1 2 3 4 5 6 7 8 9 10 11 next