GDPR Affects IAM Usage

How GDPR Affects IAM Usage

GDPR is placing a lot of demands on companies to protect the privacy of individuals. But what does that mean for identity management? The European Union’s General Data Protection Regulation (GDPR) takes effect May 25 and aims to protect the identity of individuals. Unfortunately, its requirements are more complex than ... Read More
Security Boulevard
IAM in a Gig Economy

Tips for Using IAM in a Gig Economy

IAM can be challenging for security teams and downright vexing for freelance and short-term contract workers. These tips will help smooth the IAM path for all. Even in the strong U.S. economy—or perhaps because of it—layoffs of permanent personnel are common and an army of freelance or gig workers are ... Read More
Security Boulevard
Healthcare Data Breaches

3 Payloads in Healthcare Data Breaches

/ / Data breach, health care
The news is full of a variety of attacks on healthcare data, ranging from ransomware attacks on small clinics and large hospitals to the massive data theft from the behemoth Veteran’s Administration and myriad threats in between. But as is the case with attacks in other sectors, typically little thought ... Read More
Security Boulevard
Training Machine Learning

3 Tips in Training Machine Learning for Security Work

If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, security systems included. Thus, it appears that resistance is futile, as some version of Skynet is likely inevitable—although which version ultimately manifests depends entirely ... Read More
Security Boulevard
Machine Learning Security

6 Ways Machine Learning Can Help with Security

If you were to believe all the marketing buzz about machine learning, you would think it the answer to all security teams’ prayers. But it isn’t. At least not yet. Even so, machine learning is pretty powerful tech and there are places it can be helpful to your security measures ... Read More
Security Boulevard
Security GDPR Compliance

6 Tricky Obstacles Security Teams Face in GDPR Compliance

The European Union’s General Data Protection Regulation (GDPR) takes effect May 25 and the penalties are stiff for failing to comply. Many are still unsure whether their companies are safely out of harm’s way. The regulation is long and full of terrors, to be sure. However, resistance is futile. “Many ... Read More
Security Boulevard
Stealing Infrastructure Cryptomining Attacks

Stealing Infrastructure: Cryptomining Attacks on Container Environments

/ / containers, cryptomining
Usually the target is data and the goal is theft. But thieves are expanding their horizons and aiming to cash in elsewhere. A new target recently exposed by researchers at Aqua Research is computing resources: The team says containers are being commandeered for cyptocurrency mining, or cryptomining. “We think that ... Read More
Security Boulevard
What Security Pros Need to Know About Machine Learning in the Year Ahead

What Security Pros Need to Know About Machine Learning in the Year Ahead

/ / AI, machine learning
If you are to believe the marketing hype, artificial intelligence (AI) is a superhuman security entity that far supersedes your puny, mortal skills. But that’s just swill for the bean counters who likely wish they could dump payroll as a line item from their budget spreadsheet. It’s certainly not the ... Read More
Security Boulevard
Army to Commission Civilians as Cyber Officers

Army to Commission Civilians as Cyber Officers

The U.S. Army has announced its pilot program to directly commission civilians as cyber operations officers is close to launching. Lt. Gen. Paul Nakasone, commander of U.S. Army Cyber Command, said the pilot program was approved Oct. 27 and the Army will begin selecting officers in a few months. Specifically, ... Read More
Security Boulevard
How CISOs Can Successfully Talk Security to CEOs

How CISOs Can Successfully Talk Security to CEOs

It would be funny, if it were not so frustrating, that two individuals so intent on managing risk don’t understand one another. But that is the fundamental problem between business and security leaders. The gap is so huge that bridging it may seem nearly impossible. Yet, it can be done ... Read More
Loading...