Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la! 
‘Tis the season to be swindled, Fa, la, la, la, la, la, la, la, la!
The post Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam appeared … Continue reading Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Going on the Offense: How to Eliminate Internal Threats

Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used to be discussions about how to keep bad guys out has evolved to how to manage and address internal threats. In… Continue reading Going on the Offense: How to Eliminate Internal Threats

Simplifying PCI DSS 3.2 Compliance with Preempt

If your organization handles credit cards, you are no doubt familiar with  Payment Card Industry Data Security Standard (PCI DSS) compliance. PCI DSS is a set of requirements and procedures that have been established in order to strengthen se… Continue reading Simplifying PCI DSS 3.2 Compliance with Preempt

The Joy of Tech®, ‘All We Are Is Dust In The Algorithm’

Via the non-trackable observations of Nitrozac and Snaggy at The Joy of Tech®’
Permalink
The post The Joy of Tech®, ‘All We Are Is Dust In The Algorithm’ appeared first on Security Boulevard.
Continue reading The Joy of Tech®, ‘All We Are Is Dust In The Algorithm’

Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

I’ve heard it many times from customers: “IT Security needs to be transparent to users in order to be successful.” Unfortunately, we are now in a digital age where things have dramatically changed and research has shown over and … Continue reading Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

Security fatigue is real – we need usable security

A preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security fatigue is a real thing. Security fatigue – weariness from dealing with computer security as well as reluctance to do so – leads to risky computing behavior such as avoiding security decisions altogether and going with the easiest option, failure to follow security rules, and so on. … More Continue reading Security fatigue is real – we need usable security