Data Breach Under GDPR

How to Prepare for a Data Breach Under GDPR

| | Cyberlaw, GDPR, Privacy
The European Union’s General Data Protection Regulation (GDPR) came into effect last month with a mighty thud. This wide-ranging law requires businesses to protect the personal data and privacy of EU citizens ...
Security Boulevard
Next Generation of Cybersecurity Talent

Top 4 Ways to Find the Next Generation of Cybersecurity Talent

The talent shortage in cybersecurity is a well-known and well-discussed problem. There are more jobs in cybersecurity than there are qualified employees to fill them. This problem is compounded by the fact ...
Security Boulevard
The Kill Chain Model

The Kill Chain Model Works When Analysts See the Full Picture

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery ...
Security Boulevard
Microsoft Age of Collaboration

Microsoft and the Age of Collaboration: Now, We Stand

Thank you, Microsoft. When teaching about computer security, I’ve often quipped, “There is ‘Infosec,’ ‘Comsec’ and ‘Jobsec.’”  Thanks to the ubiquitous Windows platform, fraught with security holes that were found on what ...
Security Boulevard
Mobile Fitness App Vulnerabilities

How Healthy Is Your Mobile Fitness App? 7 Common Security Vulnerabilities

Ironman triathlete or couch potato, there’s a mobile fitness app that promises to help you reach your health and fitness goals. Running with a buddy is great, but running with a fitness ...
Security Boulevard
Departing Employees Taking Data

Are Departing Employees Taking Your Data with Them?

The offboarding process is seemingly straightforward: departing employees return all company property, including laptop, mobile device and building access card. However, they could be walking out the door with something far more ...
Security Boulevard
Mobile Devices for GDPR Compliance

Organizations Are Overlooking Mobile Devices for GDPR Compliance

The dawn of the European Union General Data Protection Regulation (GDPR) is upon us, but organizations are overlooking the risk of mobile devices. The cost for non-compliance is steep. For example, if ...
Security Boulevard
Protecting Your Privileged User Accounts

Protecting Your Privileged User Accounts

Not keeping privileged user accounts secure is equal to handing over the keys to the kingdom A thief is planning to rob a museum’s visiting jewelry exhibit. He or she could acquire ...
Security Boulevard
SSH Management for Stronger Security

Bringing Sanity and Clarity to SSH Management for Stronger Security

Poor to no visibility is a dangerous scenario for enterprise and government IT executives today. In trying to manage their digital infrastructure, they often are faced with one question: Which functional group ...
Security Boulevard
DDoS Carpet Bombers

Pulling the Rug Out on DDoS Carpet Bombers

Network attacks driven by traffic, such as DDoS, have long been classified by a capacity threshold or baseline limit. When traffic surpasses that limit, an alarm is triggered to indicate an attack ...
Security Boulevard
Loading...