The enemy is us: a look at insider threats

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in th… Continue reading The enemy is us: a look at insider threats

How to Protect Your Organization From Insider Threats

Malicious actors outside your organization aren’t always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats.

The post How to Protect Your Organization From Insider Threats appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Insider Threats

How to Protect Your Organization From Insider Threats

Malicious actors outside your organization aren’t always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats.

The post How to Protect Your Organization From Insider Threats appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Insider Threats

146 Billion Records Leaked by 2023, Small Businesses Left Most Vulnerable, Study Says

Enterprises are at risk now more than ever because it seems they keep falling behind on infrastructure security, while hackers are more vigilant and sophisticated in their schemes. Researchers can’t really put their finger on what it is exac… Continue reading 146 Billion Records Leaked by 2023, Small Businesses Left Most Vulnerable, Study Says

NSA hasn’t closed security windows Snowden climbed through

One of three problems found in an audit: two-person access controls haven’t been properly implemented at data centers and equipment rooms. Continue reading NSA hasn’t closed security windows Snowden climbed through

Going on the Offense: How to Eliminate Internal Threats

Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used to be discussions about how to keep bad guys out has evolved to how to manage and address internal threats. In… Continue reading Going on the Offense: How to Eliminate Internal Threats

CIO Roles Grow More Strategic As Cloud Migration and Data Security Become Industry Standards

The topic of cybersecurity is rapidly moving up the agenda of CIOs.
The post CIO Roles Grow More Strategic As Cloud Migration and Data Security Become Industry Standards appeared first on Security Boulevard.
Continue reading CIO Roles Grow More Strategic As Cloud Migration and Data Security Become Industry Standards

Cybersecurity Is A Crucial Objective; Not All C-Level Execs Know That

It’s common knowledge that cyberattacks will escalate, so upper management has to develop an understanding of the threat landscape, the different types of attacks and what it all involves. Right now, the Trump administration is working on an… Continue reading Cybersecurity Is A Crucial Objective; Not All C-Level Execs Know That

New research shows 75% of ‘open’ Redis servers infected

Since our initial report on the RedisWannaMine attack that propagates through open Redis and Windows servers, we’ve been hearing about more and more attacks on Redis servers. Redis is a great tool, it can serve as in-memory distributed database, … Continue reading New research shows 75% of ‘open’ Redis servers infected