Cybersecurity

6 Must-Read Articles for Cybersecurity Pros, May 2016

Today’s roundup of IAM and Cybersecurity news includes ICS malware, biometric identity management, ATM skimming, the threat landscape, and more. Get this biweekly update delivered a day earlier by signing up for our newsletter.   Wells Fargo to Roll Out Eye-Scans for Mobile App Sign-In American banking giant Wells Fargo plans to go ahead with […]

6 Must-Read Articles for Cybersecurity Pros, May 2016 Read More »

What Is Threat Intelligence, Anyway?

This article was authored by Idenhaus’ Director of Cybersecurity, Derek Christensen. Threat Intelligence is experiencing its 15 minutes of fame as this year’s cybersecurity buzzword. It was a session topic at last month’s RSA Conference – From an Unknown Discipline to Cyber-Buzzword – and is considered a “must have” for all security analysts. Practically everyone is going on

What Is Threat Intelligence, Anyway? Read More »

6 Must-Read Cybersecurity Articles, January 2016

Here are the must-read Cybersecurity, Infosec, and Identity Management articles from January 1 – 13, 2016. You can sign up for our biweekly newsletter here.   Researchers Out Default Passwords Packaged With ICS/SCADA Wares Information was gathered on more than 100 products using default passwords such as “admin.admin,” “password,” “root,” and “administrator,” found in the open passwords lists and vendor documentation.

6 Must-Read Cybersecurity Articles, January 2016 Read More »

Getting Started with Data Loss Prevention: 4 Best Practices

Client A implemented DLP blocking early in the project and blocked several key business transactions. They had not defined a process to review and resolve false positives quickly, and once the business users became unhappy it led to the removal of the DLP solution. Organizations have had a tumultuous relationship with Data Loss Prevention solutions

Getting Started with Data Loss Prevention: 4 Best Practices Read More »

7 Articles Trending in Security this Week

  Security, AI, IoT, digital transformation to dominate 2016 “For all the benefits of increased agility, flexibility, productivity and convenience provided by IoT and smart devices, the system remains worryingly open to attack.” The year 2015 has been another exhilarating year in the technology industry, with advances in cloud computing, machine-to-machine (M2M) and the Internet

7 Articles Trending in Security this Week Read More »

A Fresh Approach to Cybersecurity, Part 1

This is the first installment of a four-part series on the equal nature approach to cybersecurity.  “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” ~Bruce Schneier What is Cybersecurity? The answer to “What is Cybersecurity?” changes every couple of years based on

A Fresh Approach to Cybersecurity, Part 1 Read More »

9 Cyber Security Questions Every Executive Should Ask

According to 2015 Cost of Cyber Crime, recently released by The Ponemon Institute, the minimum cost of cyber crime to a company was $1.9M while the maximum cost was as much as $65M. As news of major cyber attacks becomes an almost weekly occurrence, organizations are still struggling to define a security model and determine how

9 Cyber Security Questions Every Executive Should Ask Read More »

Takeaways from the 2015 Cybersecurity Forum in Atlanta

Here are some cool takeaways from the Cybersecurity Forum with Israel and the American South hosted by Baker Donelson at Georgia Tech. The conference was broad in scope and addressed a wide range of issues in Cybersecurity across people, process, and technology. Here are some of the most impactful sound bites from the forum: Today,

Takeaways from the 2015 Cybersecurity Forum in Atlanta Read More »

Scroll to Top