article thumbnail

FTC Posts Third Blog in Its “Stick with Security” Series

Hunton Privacy

On August 4, 2017, the FTC published the third blog post in its “Stick with Security” series. For example, a staff member in charge of payroll should have password protected access to a database of employee information. The FTC’s next blog post, to be published Friday, August 11, will focus on secure passwords and authentication.

IT 40
article thumbnail

Your CVSS Questions Answered

IT Governance

So, whether you’re a developer using a web application scanning tool to assess your own work, or a systems administrator doing your monthly due diligence checks with a vulnerability scanner, or a third-party security company performing a penetration test , you’re likely to use the CVSS. One example is TLS [Transport Layer Security].

IoT 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adconion Execs Plead Guilty in Federal Anti-Spam Case

Krebs on Security

For example, the government found the men leased some of their IP address ranges from a Dutch company that’s been tied to a scandal involving more than four million addresses siphoned from the African Network Information Centre (AFRINIC), the nonprofit responsible for overseeing IP address allocation for African organizations.

Marketing 245
article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

We explain everything you need to know in this blog. An insider threat is someone who works for, or with, an organisation and uses their legitimate access to company data to breach sensitive information or damage systems. There are countless examples of people who have turned to crime when they need money or they want more.

article thumbnail

How to start your career in cyber security

IT Governance

A version of this blog was originally published on 8 December 2017. In this blog, we provide tips for getting your cyber security career started no matter your background. Account executives and junior penetration testers, for example, tend to have little work experience, and can learn while on the job.

article thumbnail

Mitigating Ransomware Attacks – Decoupling Encryption Keys From Encrypted Data

Thales Cloud Protection & Licensing

Global GPS giant Garmin and leading camera-maker Canon are two recent examples of ransomware attacks on large businesses. For example, the average cost to remediate a ransomware attack costs US$1,448,458 and US$732,520 for those that did not pay the ransom. What is the secure escrow procedure followed for these keys? To Sum It Up.

article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

There’s just one problem…these massive, radical, interconnected technology systems also raise serious privacy and security concerns. For example, by requesting the route from school to home, personal details about your daughter’s schedule, preferences, and whereabouts are being provided to the driverless car technology company.

Security 113