One Small Sticky Note on a Password Wall, One Giant Leap for Security

If you’re writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.

The post One Small Sticky Note on a Password Wall, One Giant Leap for Security appeared first on Security Intelligence.

Continue reading One Small Sticky Note on a Password Wall, One Giant Leap for Security

One Small Sticky Note on a Password Wall, One Giant Leap for Security

If you’re writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.

The post One Small Sticky Note on a Password Wall, One Giant Leap for Security appeared first on Security Intelligence.

Continue reading One Small Sticky Note on a Password Wall, One Giant Leap for Security

Can Cyber Situational Awareness Prevent the Next Black Swan Cyber Event?

Security analysts cannot predict black swan events, but they can estimate the likelihood of a damaging breach through cyber situational awareness.

The post Can Cyber Situational Awareness Prevent the Next Black Swan Cyber Event? appeared first on Security Intelligence.

Continue reading Can Cyber Situational Awareness Prevent the Next Black Swan Cyber Event?

Is the Security Community Out of Touch?

Instead of waiting for industry giants to take the lead, the security community should encourage dialogue and collaborate to create a security framework.

The post Is the Security Community Out of Touch? appeared first on Security Intelligence.

Continue reading Is the Security Community Out of Touch?

Identity and Access Governance: Lessons From the Front Line

Identity and access governance is not a technology project — it’s a business transformation program. Organizationwide buy in is critical.

The post Identity and Access Governance: Lessons From the Front Line appeared first on Security Intelligence.

Continue reading Identity and Access Governance: Lessons From the Front Line

The Enterprise Mobility Conundrum: How to Control the Data?

Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.

The post The Enterprise Mobility Conundrum: How to Control the Data? appeared first on Security Intelligence.

Continue reading The Enterprise Mobility Conundrum: How to Control the Data?

The Enterprise Mobility Conundrum: How to Control the Data?

Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.

The post The Enterprise Mobility Conundrum: How to Control the Data? appeared first on Security Intelligence.

Continue reading The Enterprise Mobility Conundrum: How to Control the Data?

Nine Security Practices That May Not Be Effective

Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.

The post Nine Security Practices That May Not Be Effective appeared first on Security Intelligence.

Continue reading Nine Security Practices That May Not Be Effective