Cybersecurity in 2028: Looking a Decade Ahead

It’s mid-February, which means IT security executives’ and industry analysts’ plans for 2018 are really starting to gather momentum. Every year, this personnel faces the difficult task of deciding what security investments they should make given current developments in the cyber threat landscape. Google Trends and other services can help organizations make these types of … Read More The post Cybersecurity in 2028: Looking a Decade Ahead appeared first on The State of Security.
Read more

Physician, protect thyself: healthcare cybersecurity circling the drain

Study after study reveals that healthcare cybersecurity breaches are on the uptick. In this blog series, we'll look into the reasons why healthcare cybercrime is trending, understand the motivations of threat actors behind it, and discuss what the healthcare industry can do to care for itself and the people they swore to protect. Categories: 101 Business Tags: byodcybersecurityEHRelectronic health recordhealth appshealth carehealthcarehealthcare cybersecurityHIPPAmHealthsecurity training (Read more...) The post Physician, protect thyself: healthcare cybersecurity circling the drain appeared first on Malwarebytes Labs.
Read more

HHS Deputy CIO Amélie Koran on Security’s Challenges, Part 1

Meet Amélie Koran, deputy CIO for the U.S. Department of Health and Human Services, Office of the Inspector General, and one of the keynote speakers at the upcoming InfoSec World 2018 March 19-21 in Lake Buena Vista, Florida. Her March 19 keynote address, “Are We There Yet? Getting There is Only Half the Trip,” highlights some..
Read more

Overcoming the Blame Game – Improving Security without Destroying Careers

Today, I was sitting in an awesome class being held at @BSidesHSV, and it got me thinking. The class entitled “Fundamentals of Routing and Switching for Blue and Red Teams” put on by @paulcoggin was a deep dive into layer 2 and layer 3 configurations and possible means of compromise. The content was outstanding, and … Read More The post Overcoming the Blame Game – Improving Security without Destroying Careers appeared first on The State of Security.
Read more

Top 10 Mobile App Security Best Practices for Developers

App security isn’t a feature or a benefit. It is a bare necessity. One breach could cost your company not just millions of dollars but a lifetime of trust. That is why security should be a priority from the moment you start writing the first line of code. While you were busy developing the most … Read More The post Top 10 Mobile App Security Best Practices for Developers appeared first on The State of Security.
Read more

Who Says Holiday Romance is Dead? Catphishers, That’s Who

It’s that time of year again. A day of romance, crowded restaurants, overblown gestures of love, and… Well. You get the idea. For those of us in the security world there’s another, less enjoyable component to Valentine’s Day. Yes, even less enjoyable than trying to share a romantic meal while sitting less than a foot away from four other couples. Yes, I’m talking about holiday themed phishing scams. We’ve written about this precise topic many times before (including last Valentine’s Day) but so far we’ve never tackled the specific scams that surround this romance-centric annual event. So before you send those dutch-courage fueled love notes, just take a moment to consider…
Read more
Page 1 of 2112345...1020...Last »