Tag: How
-
How Devs Can Improve Security (Part One)
To understand the current and future state of the cybersecurity landscape, we spoke to and received written responses from 50 security …
-
How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack?
The financial services industry (FSI) is a complex ecosystem in which each entity has dependencies on others around it. In this highly …
-
Equifax Owes You Money for Failing to Protect Your Privacy. Here’s How to Get It
In September of 2017 credit monitoring service Equifax announced that a massive, avoidable data breach had exposed the personal financial …
-
How to improve the hiring and retaining of infosec professionals?
The cybersecurity staffing and skills shortage is a well-known reality and the situation is predicted to get worse in the coming years. …
-
How to Share Data Science Secrets Without Sacrificing Security
Data scientists and data engineers who need to work with sensitive data should be familiar with using secrets, such as: User credentials …
-
How cyber criminals are still snaring victims using seven-year-old malware
Some of the most popular malware on underground forums are open source or cracked versions of malicious software that use exploits that are …
-
How to set up Azure AD to spot risky users
This is Susan Bradley for CSOOnline. Today’s topic is going to be about why you might want to look at different levels of Azure Active …
-
How IT, Security Teams Can Protect the New Perimeter
It is time to readdress the security paradigm. As workplace technology continues to evolve into a SaaS-powered world, it’s the business …
-
How to Watch Robert Mueller’s Testimony—and What to Expect
special counsel Robert Mueller will testify before Congress. More specifically, he’ll field questions from the House Judiciary and …
-
Live Webinar | The CISO Challenge: How to Effectively Speak Cyber Security to Your Executive Board
Business Continuity Management / Disaster Recovery , CISO Trainings , Cybercrime Live Webinar | The CISO Challenge: How to Effectively …
-
As Authoritarian Governments Surveil the Internet, Open Source Projects Decide How to Respond
Mozilla, the non-profit behind the Firefox browser, is debating whether to block a cryptographic certificate Kazakhstan’s government is …
-
How to establish a security culture within IT
It’s impossible to establish a security culture within a corporation if such a culture doesn’t already exist within IT. IT is …
●●●