How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How to Prioritize Vulnerability Patching

Data Breach Today

Risk 185

How to Prepare for Misconfigurations Clouding the Corporate Skies

Threatpost

With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.

Cloud 106

Zynga's Breach Notification: How to Not Inform Victims

Data Breach Today

Don't Blame Us, Blame Hackers, Mobile Gaming Giant Says "Cyberattacks are one of the unfortunate realities of doing business today," reads gaming company Zynga's data breach notification, thus breaking the first rule of crisis management: Own your mistakes.

How to: Find and Clean out Your Dark Data with everteam.discover

Everteam

We talk a lot about how you need to get control of the dark data spread across disconnected silos in your company. Now let’s show you how you can do with our tools; in this case, with everteam.discover. Everteam.discover is our file analytics product, and it’s very easy to use.

ROT 80

How to Make Your Containers More Observable

Data Breach Today

Want to keep up with your dynamic environment with unified insights? Splunk for container monitoring provides a solution to help ensure your containers are available, and issues are fixed quickly with minimal effort.

170
170

How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. How do you know the lifespan of a site selling that must-have gadget at the lowest price?

How to Achieve 'Laser-Cut Fraud Prevention'

Data Breach Today

Trusteer's Avner Gideoni on Creating the Perfect Defensive Blend How do machine learning, threat intelligence and advanced analytics blend together to form agile and accurate fraud prevention?

How to Think Like an Attacker

Data Breach Today

It's one thing to know your attackers. It's another to emulate some of their techniques so you can improve your own enterprise defenses. Craig Harber, CTO of Fidelis Cybersecurity, is an advocate of this "think like an attacker" defensive strategy

How to Punish Cybercriminals

Schneier on Security

There are approximately 300,000 reported malicious cyber incidents per year, including up to 194,000 that could credibly be called individual or system-wide breaches or attempted breaches. This is likely a vast undercount since many victims don't report break-ins to begin with.

Paper 113

How to Manage Supply Chain Risks

Data Breach Today

Agile environments benefit from development platforms and open-source software, but that also raises the risks of attacks seeded in those supply chains, says Chet Wisniewski of Sophos, who describes steps that organizations can take to mitigate the risks

Risk 100

OnDemand Webinar | How to Mitigate Insider Data Breaches

Data Breach Today

How machine learning and advanced DLP technology can mitigate insider data breaches. How machine learning and advanced DLP technology can mitigate insider data breaches

How to Predict Insider Fraud

Data Breach Today

How to Shift Security Practices From Monitoring to Observability

Data Breach Today

Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected? Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids?

How to Get Your Equifax Settlement Money

WIRED Threat Level

A settlement with the FTC means Equifax will pay victims of its breach $125 or more. Make sure it pay ups. Security Security / Security News

IT 114

How to Maximize Data Used to Fight Fraud

Data Breach Today

Splunk's Jim Apger on Streamlining Omni-Channel Defenses The data being used to drive effective anti-fraud efforts can be rich in context and useful for other activities.

211
211

OnDemand Webinar | How to Secure Custom Apps Without Code

Data Breach Today

The number one gating factor for true edge compute on mobile is security, and that's a hard thing to get into a mobile app Accelerating the development of secure custom apps without coding.

How To Clear Out Your Zombie Apps and Online Accounts

WIRED Threat Level

Here's how to get rid of them. All those services you signed up for but forgot about? They're a security risk. Security Security / Security Advice

Risk 114

How to manage content chaos

OpenText Information Management

ILTACON has been a staple for legal and IT professionals for over 40 years, and this year’s conference promises not to disappoint. Spend less time searching for … The post How to manage content chaos appeared first on OpenText Blogs. The agenda is packed with sessions on collaboration, technological advancements and tangible takeaways that address the challenges law firms and corporate legal clients face on a daily basis.

IT 66

Fighting Human Nature: How to Combat Socially Engineered Account Takeover Attacks

Data Breach Today

Cybercriminal on why social engineering is one of the most difficult to stop online crimes. As a fraud management leader, are you aware that social engineering is a widespread and increasingly common tactic used to takeover customer accounts? Learn from a former U.S.

187
187

New Hacker Exploits and How to Fight Them

Data Breach Today

Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off Dan Larson of Crowdstrike on Battling New Attack Techniques Hackers are constantly developing new exploits, and updating defenses is not an easy task.

176
176

Cyber Exposure: How to Discover, Measure and Reduce Your Risk

Data Breach Today

Tenable's Diwaker Dayal on Benchmarking the Success of Your Security Posture How does an organization measure cybersecurity success? For too many, it's simply the absence of a breach.

Risk 204

How to Avoid Card Skimmers at the Pump

Krebs on Security

But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station. Booth said the SAPD has yet to see a skimming incident involving newer pump models like the one pictured directly above.

Beyond 'Black Box' MSSP Security: How to Get the Most

Data Breach Today

Matt Peters of Expel Describes Hybrid Approaches to Security Operations For a managed security service provider to deliver maximum value for customers, it needs to provide a hybrid approach that delivers not only actionable security information but also context, says Matt Peters of Expel

How to safeguard paper medical records

TAB OnRecord

In all the discussion about privacy security, it is essential to take care of the basics. The post How to safeguard paper medical records appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 78

How Does Encryption Work?

Productivity Bytes

The word “encryption” is synonymous with data protection, and most people are aware of its functionality in their day-to-day lives within a digital context. The post How Does Encryption Work? Cybersecurity How-To Tech how-to security

How to alleviate supply chain pain points

OpenText Information Management

Imagine this: you get home on a Friday evening and start to order pizza, only to find out they are out of mushrooms and jalapeno peppers. Why, you ask? Because the delivery truck was stranded overnight.

B2B 52

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks

113
113

How to handle a ransomware attack

IT Governance

So, your computer screen has been hijacked by criminals who are demanding money to return your systems. That’s a question more organisations are having to ask themselves nowadays, with at least 55 ransomware attacks reported in the first half of 2019. How are they supposed to do work?

How to eliminate roadblocks to digital transformation

OpenText Information Management

Our second blog covered how to ensure quality data drives your analytics activities. The third examined how you can integrate … The post How to eliminate roadblocks to digital transformation appeared first on OpenText Blogs.

How to become an ethical hacking master

IT Governance

Does the idea of being paid to hack into organisations’ systems sound appealing? The pay is good, it’s creative and you get to test your skills every day. You can implement all the defences you like, but you won’t know whether they work or not until someone tries to get past them.

5 Common Phishing Attacks and How to Avoid Them?

Security Affairs

The emails are designed in a way that it appears to be authentic or belonging from a real business or authoritative source. These emails appear to be coming from some authentic source like from your bank or some legit business organization. Tips to Prevent Phishing.

How to Use FDA's Medical Device Cybersecurity 'Playbook'

Data Breach Today

aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp.

How to lose your password

Thales eSecurity

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead.

How to Run a Threat Hunting Program

eSecurity Planet

What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this security tool

IT 92

How to Future-Proof the Critical National Infrastructure

Data Breach Today

Design Cyberattack Resilience Into Technology, Says Professor Prashant Pillai The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pilla

Expert discovered how to brick all Samsung mobile phones

Security Affairs

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones.

IT 114