DerbyCon 9

Derbycon 2019, Brent White’s & Tim Roberts’ ‘Getting The Most Out Of Your Covert Physical Security Assessment: A Clients Guide’

Many Thanks to Adrian Crenshaw (Irongeek), and his Videographer Colleagues for Sharing His and Their Outstanding Videos Of This Last And Important DerbyCon 2019. Visit Irongeek for additional production credits and additional ...
Top digital security tips from our Just Ask Gemalto experts that can help you stay safe online

Top digital security tips from our Just Ask Gemalto experts that can help you stay safe online

Our sister website Just Ask Gemalto has a myriad of practical advice and tips to help you stay safe online this Cyber Security Awareness Month. We take at a look at some ...

Best commercial tools for Red Teaming

| | Penetration Testing
Introduction A variety of different free tools exist for Red Team operations, and, in many cases, a Red Team can get by just fine taking advantage of these free or open-source resources ...

Lessons learned: The Capital One breach

| | Security Awareness
Overview of the breach The Capital One breach was accomplished by a former AWS employee who took advantage of a misconfigured firewall used by Capital One to protect their AWS deployment. This ...
Bitglass Security Spotlight: 20 Million Russian Citizens Exposed

Bitglass Security Spotlight: 20 Million Russian Citizens Exposed

Here are the top stories of recent weeks: 20 Million Russian Citizens Exposed One Billion WhatsApp Users Can Lose Personal Data Via GIFs More Than 500 U.S. Schools Have Been Affected by ...

Welcome to Digiville

Digital transformation creates a new landscape for across the globe. While organizations go through major shifts fueled by technology, understanding the lay of the land is helpful to appreciate the breadth of ...

To Transform Your Business, You Must Transform Risk Management

The nature of risk management is changing as organizations transform digitally. At RSA® Charge, ITSPmagazine talked with RSA thought leaders, partners and customers to gain insight into the risks of digital transformation, ...

Avast fights off cyber-espionage attempt, Abiss | Avast

| | Avast News, cybercrime
Global software companies are increasingly being targeted for disruptive attacks, cyber-espionage and even nation-state level sabotage, as evidenced by the many reports of data breaches and supply chain attacks over the last ...
insider threats

To Mitigate Insider Threats, Time is of The Essence

Insider threats pose myriad challenges to an organization but are often deprioritized in favor of preventing external threats from compromising company assets. It’s a situation further exacerbated by the fact that a ...
Security Boulevard
data protection

DevOps Chat: Data Protection in the Cloud, With Druva

As any CIO knows, a data management architecture is essential to caring for one of the organization’s most valuable assets: data. Data management sounds simple but it’s not. Backup and recovery, disaster ...
Security Boulevard
Loading...