Security
WHITE PAPER ON CLOUD SECURITY RISKS – AND HOW TO MITIGATE THEM
This post was originally published by(ISC)² Management. Cloud security today is touted as better than ever. So how do we explain the ever-increasing number of data breaches? According to the new white paper, Cloud Security Risks & How to Mitigate Them, the disconnect arises from a shared security model. Cloud Service Providers protect the datacenter, but customers […]
THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A PROGRAM?
This post was originally published by (ISC)² Management. It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for […]
Bitglass Security Spotlight: Healthcare Burglary Results in Data Breach Affecting Over 654,000 Members
This post was originally published by Juan Lugo. As cloud adoption continues to increase exponentially across all industries, data breaches have been, by large, the result of hacking and IT incidents. However, there are still a few data breaches each year that arise from loss or theft, and that is exactly what occurred to medical transportation vendor, GridWorks. […]
Bitglass Security Spotlight: Mega Breach Exposes More Than 250 Million
This post was originally published by Juan Lugo. Tech giant, Microsoft, failed to uphold the most common security requirement – password protection, for a database that contained personal information on more than 250 million customers. The database is said to have customer information dating back to 14 years, in some cases. Microsoft has been in the news […]
IN CASE YOU MISSED IT: RECAPPING SECURITY CONGRESS 2019
This post was originally published by (ISC)² Management. Security Congress 2019 was our largest and most in-depth cybersecurity education conference to date. Held over the course of three days in October, the event was jam-packed with more than 180 sessions (covering 18 tracks), over 200 speakers and headline-worthy keynote speakers. Read more here: https://blog.isc2.org/isc2_blog/2019/12/in-case-you-missed-it-recapping-security-congress-2019.html Photo:www.forbes.com
How to save your WordPress website from Cyber Attacks with Plugins
If you are thinking to save your WordPress websites from Cyberattacks such as Brute Force Logins and Spam then you need to use the following free plugins- WordPress Firewall- This plugins filters all suspicious web requests and also can detect SQL Injection attacks. As this plugin has the potential to whitelist and blacklist contents, comments and […]
SECURITY CONGRESS FINAL THOUGHTS: BEING THERE FOR OTHERS (PART 1)
This post was originally published by (ISC)² Management. Sometimes you need a boatload of people to help you through. It’s a lesson Admiral William H. McRaven (retired) learned after a parachute accident that left him bedridden for months. The accident happened while he was participating in a Naval Special Warfare exercise involving a 1,000-foot free-fall […]
SECURITY CONGRESS FINAL THOUGHTS: BEING THERE FOR OTHERS (PART 2)
This post was originally published by (ISC)² Management. Admiral William H. McRaven (retired) was one of the speakers at (ISC)2 Security Congress who received a standing ovation. Another was Eric Wahl, an artist and best-selling author, who delivered the lunch hour keynote on the second day. He mesmerized the audience by painting portraits of Michael Jordan, John […]
Google Pay users get Biometrics Security
All those who use Google Pay for making digital payments might feel happy by knowing that the technology giant has introduced Biometrics security to allow users to protect their online transactions using fingerprint and facial recognition features. The feature can be seen in the latest 2.1 version of the app and will be rolled out […]
Security Mistakes and the Culture of Innovation
This post was originally published by CloudPassage. We live in a culture of rapid innovation, but that innovation can result in a variety of security mistakes. Businesses must innovate quickly to compete in today’s markets, and software and public cloud infrastructure, or IaaS, are significant enablers of that innovation. Software is a fast mechanism to […]