Overcoming the Blame Game – Improving Security without Destroying Careers

Today, I was sitting in an awesome class being held at @BSidesHSV, and it got me thinking. The class entitled “Fundamentals of Routing and Switching for Blue and Red Teams” put on by @paulcoggin was a deep dive into layer 2 and layer 3 configurations and possible means of compromise. The content was outstanding, and … Read More The post Overcoming the Blame Game – Improving Security without Destroying Careers appeared first on The State of Security.
Read more

Top 10 Mobile App Security Best Practices for Developers

App security isn’t a feature or a benefit. It is a bare necessity. One breach could cost your company not just millions of dollars but a lifetime of trust. That is why security should be a priority from the moment you start writing the first line of code. While you were busy developing the most … Read More The post Top 10 Mobile App Security Best Practices for Developers appeared first on The State of Security.
Read more

6 Top Cloud Security Threats in 2018

2018 is set to be a very exciting year for cloud computing. In the fourth financial quarter of 2017, Amazon, SAP, Microsoft, IBM, Salesforce, Oracle, and Google combined had over $22 billion in their revenue from cloud services. Cloud services will only get bigger in 2018. It’s easy to understand why businesses love the cloud. … Read More The post 6 Top Cloud Security Threats in 2018 appeared first on The State of Security.
Read more

An Analog to Security and Compliance: The Wonder Twins

Security and compliance are two sides of the same coin, although they are often seen as adversaries. The truth is, much like the 1980s power siblings, the Wonder Twins (whose powers only functioned when their fingers touched), they work hand-in-hand to shore up your information security better than any other combination. Compliance is Key Regulatory … Read More The post An Analog to Security and Compliance: The Wonder Twins appeared first on The State of Security.
Read more

Who Is Responsible for Your Cloud Security?

The cloud is a tremendous convenience for enterprises. Running a data center is expensive. Doing so not only requires buying a lot of servers, cable, and networking appliances but also electricity, labor costs, cooling, and physical space. Services like Amazon’s AWS, Microsoft’s Azure, Oracle’s Cloud, and Google’s Cloud Platform give businesses the benefits of having … Read More The post Who Is Responsible for Your Cloud Security? appeared first on The State of Security.
Read more

Malicious Trends: Cryptojacking Could Surpass Ransomware as Primary Money Maker

Cryptocurrencies are hot. According to https://coinmarketcap.com, there are now over 1300 cryptocurrencies with new initial coin offerings (ICOs) accelerating all the time. Even Kodak is getting into the act with KODAKcoin. And currently, the price trajectory of Bitcoin is higher than a North Korean rocket, with Blockchain saving the world one application at a time. … Read More The post Malicious Trends: Cryptojacking Could Surpass Ransomware as Primary Money Maker appeared first on The State of Security.
Read more

6 Common Cloud Security Myths Debunked for You!

You’ve probably been hearing about the cloud a lot, and with the increasing number of businesses moving their data online, it’s obvious that cloud computing and security are here to stay! With a number of benefits like data security, minimized risks, regulatory compliance, flexibility, round-the-clock availability, uninterrupted maintenance and support, and more, the cloud can … Read More The post 6 Common Cloud Security Myths Debunked for You! appeared first on The State of Security.
Read more

3 Types of Digital Threats to Look Out for at the 2018 Winter Olympics

9 February marks the commencement of the 2018 Winter Olympic Games in Pyeongchang, South Korea. Athletes from around the world will compete to achieve their lifelong dream of winning an Olympic medal. It’s a spectacle to behold, both online and in person. Digital attackers realize this; you can bet they will try and capitalize on … Read More The post 3 Types of Digital Threats to Look Out for at the 2018 Winter Olympics appeared first on The State of Security.
Read more

Best Practices in Healthcare Information Security

Some of the most common phrases that come out of information security professional mouths include “Well, that did not work” and “The project fell apart, and I don’t know what I could have done better.” The pain of not knowing what security best practices your team can/should implement can cost the company time and money. It … Read More The post Best Practices in Healthcare Information Security appeared first on The State of Security.
Read more

Survey: Few Americans Are Taking Proper Password Security Precautions

Thursday is “Change Your Password Day,” a national observance of password security and best practices. Passwords are often the first line of defense protecting users from criminals with the malicious intent of invading systems and stealing data, a threat which emphasizes the importance for people to use strong and diverse passwords. Unfortunately, many Americans continue … Read More The post Survey: Few Americans Are Taking Proper Password Security Precautions appeared first on The State of Security.
Read more
Page 1 of 1112345...10...Last »