Google delivers new G Suite security tools

Google has announced several new security tools for G Suite admins and users, as well as a new 2FA option: one-time security codes based on security keys. Email security enhancements The security sandbox and advanced phishing and malware protection opt… Continue reading Google delivers new G Suite security tools

Privileged Access Management Issues? Enter Tripwire Password Manager

So, you have 2000 network devices in your environment and everyone is telling you that you have to rotate all 2000 device passwords every 30, 60 or 90 days (at a minimum) — who has time for that?! How are you going to manage this? The task seems … Continue reading Privileged Access Management Issues? Enter Tripwire Password Manager

How to demonstrate trust in cybersecurity practices with organization leaders

Chief information security officers working at high-profile enterprises know their jobs are as much about guarding their organization’s brand reputation and trust as they are about IT security. But to ensure that trust, CISOs need to know whether their security investments are actually working, and that calls for having metrics that matter to senior management, according to a new report. “It’s all about measurement,” says Home Depot CISO Stephen Ward, in remarks quoted in “The 2019 Trust Report,” released by Synack. “CISOs need a way to present security to their executive team and board in a way that clearly demonstrates and measures business risk to the organization. The executive team doesn’t want to talk about security — they want to talk about risk.” The report provides CISOs with a framework for using data from their security programs to gain a clearer sense of their organization’s ability to withstand damaging cyberattacks […]

The post How to demonstrate trust in cybersecurity practices with organization leaders appeared first on CyberScoop.

Continue reading How to demonstrate trust in cybersecurity practices with organization leaders

Security spring cleaning: 5 tips for tidying up network safeguards

Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your network, potential weaknesses and vulnerabilities will stack … Continue reading Security spring cleaning: 5 tips for tidying up network safeguards

Microsoft adds tamper protection to Microsoft Defender ATP

Microsoft has added a new tamper protection feature to Microsoft Defender ATP (formerly Windows Defender ATP) antimalware solution. When turned on, it should prevent malicious apps and actors from disabling the antimalware solution or some of its key s… Continue reading Microsoft adds tamper protection to Microsoft Defender ATP

Exposure of sensitive data via cloud applications and services increases 20%

To identify top threats, the Dtex researchers collected and analyzed information from work-issued endpoints across more than 300,000 user accounts. Proprietary, cloud and personal accounts such as email were included in the total. Assessed organization… Continue reading Exposure of sensitive data via cloud applications and services increases 20%

Security wellness takes more than a fad diet

Every year, millions of people make the same New Year’s resolution: to lose weight and improve health. But by February, a mere thirty days or so into the year, stats show 75 percent of us have fallen off the wagon. The pitfalls are many, whether the re… Continue reading Security wellness takes more than a fad diet

To Improve Critical Infrastructure Security, Bring IT and OT Together

Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.

The post To Improve Critical Infrastructure Security, Bring IT and OT Together appeared first on Security Intelligence.

Continue reading To Improve Critical Infrastructure Security, Bring IT and OT Together

Is It Time for Enterprises to Bid Farewell to BYOD?

As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe?

The post Is It Time for Enterprises to Bid Farewell to BYOD? appeared first on Security Intelligence.

Continue reading Is It Time for Enterprises to Bid Farewell to BYOD?

Pentest Toolbox Additions 2018

I’m a red teamer,.I do work similar to pentesting and use many of the same tools. This year, I’ve added several tools to my toolbox. I’ll introduce them to you below. I hope you find them valuable, as well. DoubleTap (by @4lex) I &#60… Continue reading Pentest Toolbox Additions 2018