The Journey of Securing a Long-Tail Supply Chain

Supply chains often are long and complex, and as organizations rely more and more on data to drive their businesses, digital supply chains continue to grow. And as the supply chains continue to grow, so do expectations and risks. To increase profits, … Continue reading The Journey of Securing a Long-Tail Supply Chain

The importance of IT asset management within digital transformation processes

In this Help Net Security podcast, Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about the importance of IT asset management within digital transformation processes. He illustrates why it’s crucially important to … Continue reading The importance of IT asset management within digital transformation processes

Political parties are still struggling with cybersecurity basics

Political parties in Europe and the U.S. have cybersecurity practices that fail to meet basic standards, leaving them vulnerable to hackers and foreign influence operations with elections rapidly approaching, according to security researchers. An assessment of 29 political parties in 11 countries released Tuesday by SecurityScorecard found that a party in France relies on end-of-life technology that has not had a security update in four to five months, for example. There also is a strain of malicious software emanating from an IP address assigned to an economic subcommittee of the European Union in Brussels right now, SecurityScorecard’s Director of Threat Intelligence, Paul Gagliardi, tells CyberScoop. And while American political parties tend to fare better than European political parties, according to the report, the Democratic National Committee and the Republican National Committee still have weak spots. Malware in the EU The details of the report arrive just as the European Parliament elections kick off Thursday. The malware SecurityScorecard […]

The post Political parties are still struggling with cybersecurity basics appeared first on CyberScoop.

Continue reading Political parties are still struggling with cybersecurity basics

In Business Security, Employee Cyber Hygiene Matters

Making employees aware of their impact is integral to a successful business security strategy When children cover their eyes and insist no one can see them, it’s cute. But when the majority of American adults use the same strategy to protect themselve… Continue reading In Business Security, Employee Cyber Hygiene Matters

How Can Small Businesses Safeguard Against Cyberattacks?

Small businesses have many of the same security challenges as larger organizations, without access to the same technologies Cybersecurity has become one of the biggest problems facing millions of internet and online network users today. While at first… Continue reading How Can Small Businesses Safeguard Against Cyberattacks?

Prioritizing risks in a climate of geopolitical threats

The cybersecurity landscape has become increasingly hostile in recent years, with a growing threat from common cybercriminals as well as the looming shadow of state-level geopolitical activity. Recent research commissioned by the UK government found th… Continue reading Prioritizing risks in a climate of geopolitical threats

What is SecOps? (and What are the Benefits and Best Practices?)

Security should be considered from the get-go across the business and development lifecycle. But how to get started in SecOps? Find out here!
The post What is SecOps? (and What are the Benefits and Best Practices?) appeared first on Security Boulevard.
Continue reading What is SecOps? (and What are the Benefits and Best Practices?)

Cybersecurity Hygiene: Not a Dirty Little Secret for Long

In October 2018, FICO (a consumer credit scoring specialist) began scoring the cybersecurity of companies based upon a scan of internet facing vulnerabilities. FICO grades companies using the same scoring that is familiar with consumer credit. These me… Continue reading Cybersecurity Hygiene: Not a Dirty Little Secret for Long

The fundamentals of network security and cybersecurity hygiene

Infrastructure and network security The two fundamental building blocks to ensuring that your data is secure are physical infrastructure and network security. Understanding and protecting your information from threats and human error require meticulous… Continue reading The fundamentals of network security and cybersecurity hygiene

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measu… Continue reading Rooted in Security Basics: The Four Pillars of Cyber Hygiene