System News
 1 2 3 4 5 6 7 8 9 10 11 next
Archived IT - Security Articles
11 Aug 2017
open to premium members only
Security reality check: The real threat is closer to home [65491]
ITProPortal, August 11th, 2017

"Organisations and governments often underestimate insider threats and the damage they can do...

When we think of a cyberthreat, we often imagine a nation state hacking group, or a virus trying to work its way into our company network. After all the media is full of depictions of incidents of this very nature - how many times has North Korea or Russia been blamed for hacking the West?..."
(Get More Information . .)

10 Aug 2017
open to premium members only
How to address the cybersecurity analytics and operations skills shortage [65492]
CSO Online, August 10th, 2017

"The ability to detect and respond to threats is greatly impeded by a lack of cybersecurity skills and staff. Leading organizations offer a few suggestions...

If you've followed my writing, you know that I passionately broadcast issues related to the global cybersecurity skills shortage. Allow me to report some sad news - things aren't improving at all. In 2016, 46% of organizations reported a problematic shortage of cybersecurity skills. In 2017, the research is statistically the same as last year: 45% of organizations say they have a problematic shortage of cybersecurity skills.

These numbers point to an overall dearth of talent, but the cybersecurity skills shortage is especially pronounced in cybersecurity analytics and operations..."
(Get More Information . .)

10 Aug 2017
open to premium members only
IT's 9 biggest security threats [65493]
CSO Online, August 10th, 2017

"Hacking has evolved from a one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launderers...

Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, SQL server and so on), broke in using a multitude of vulnerabilities, then explored the compromised company to their heart's content. Often their intent was exploratory. If they did something illegal, it was typically a spur-of-the-moment crime of opportunity.

My, how times have changed..."
(Get More Information . .)

09 Aug 2017
open to premium members only
The ABCs of Identity Management [65494]
CSO Online, August 9th, 2017

"Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization...

What is identity management? Broadly speaking, identity management systems (also known as identity and access management, or IAM, systems) enable the administration of individual identities within a system, such as a company, a network or even a country. More specifically, ID management in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges..."
(Get More Information . .)

08 Aug 2017
open to premium members only
The Importance of Keeping Your Cyber Security Plan Up-to-Date [65495]
SmartDataCollective, August 8th, 2017

"The threat of ransomware is on the rise, and more companies are falling victim to this invasive form of hacking. It isn't only small businesses that can fall victim to these practices and some big names have been revealed to have been targeted, including the National Health Service in the UK. This goes to highlight the importance of having an up-to-date security plan that is distributed around your company. Whether you run a startup that employs three people or you run a multinational company employing thousands, it makes sense to put a plan in place and stick to it..."
(Get More Information . .)

07 Aug 2017
open to premium members only
Cyber threatscape [65490]
Information Management, August 7th, 2017

"While the world has no doubt become more aware of cyber security, the fact remains that cyber criminals are having staggering financial success without being caught...

In recent years, coverage of cyber security incidents in the mainstream media has increased dramatically to the point that it is now common for some form of incident to be reported on a daily basis. While the world has no doubt become more aware of cyber security, the fact remains that cyber criminals are having staggering financial success without being caught..."
(Get More Information . .)

 
 1 2 3 4 5 6 7 8 9 10 11 next