Thinking of a Cybersecurity Career? Read This

Krebs on Security

Thousands of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers are less than thrilled about their hands-on, foundational skills. So what should you focus on, and what’s the best way to get started?

How to Mitigate P2P Payment Fraud

Data Breach Today

2 Experts Discuss Selecting the Right Technologies Validating identity across every digital channel is essential to track money movement information and help control P2P payment fraud, two fraud-fighting experts say


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How to Fight Against 'Authorized Payment Fraud'

Data Breach Today

a protocol designed to be an additional security layer for online credit and debit card transactions, by banks and merchants alike can play a critical role in reducing "authorized payment fraud," two security experts say

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

You've finally done it: You've won over C-Suite and your DevSecOps team is up and running. You feel ready to take on rising security threats while continuously delivering quality software updates. But how do you monitor your new program? Are you truly able to gauge the state of your projects? To ensure the success of this new breed of a team, you need to know the metrics to look at and how to advocate these metrics to C-Suite and stakeholders. Join Shannon Lietz, Leader and Director of DevsecOps at Intuit, and learn to lead your DevSecOps team to the top.

How to Do Data Modeling the Right Way


Data modeling supports collaboration among business stakeholders – with different job roles and skills – to coordinate with business objectives. What’s desperately needed is a way to understand the relationships and interconnections between so many entities in data sets in detail. A single source of data truth helps companies begin to leverage data as a strategic asset. Nine Steps to Data Modeling.

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 147

How to Check Your Devices for Stalkerware

WIRED Threat Level

Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder. You deserve privacy. Security Security / Privacy Security / Security Advice

How to Protect Your Organization's Digital Footprint

Dark Reading

As the digital risk landscape evolves and grows, organizations must stay vigilant against online threats

Risk 90

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

But new research suggests that as cybercrime has become dominated by pay-for-service offerings, the vast majority of day-to-day activity needed to support these enterprises is in fact mind-numbingly boring and tedious, and that highlighting this reality may be a far more effective way combat cybercrime and steer offenders toward a better path. Providing the power to run it is the tricky part. And when you have to put all your effort, all your attention.

What We Learned From Our Own Data-Driven ABM Strategy

ZoomInfo has created the following eBook to help other B2B organizations gain insights on how to launch their own data-driven ABM strategy. In this eBook, we will reveal the good and the bad from our own campaign and highlight some key takeaways on how to improve your ABM strategies moving forward.

OnDemand | How to Manage Your Third-Party Risk

Data Breach Today

Preventing & Managing Data Leaks The average number of parties with whom an enterprise shares sensitive information is 583, according to the Ponemon Institute.View this webinar to learn about the breadth and implication of third-party data leaks

Risk 147

How to Prioritize Vulnerability Patching

Data Breach Today

New Report Asserts That Using CVSS Scores Alone Is Inadequate Rather than focusing solely on rankings offered by the common vulnerability scoring system, or CVSS, when setting priorities for risk mitigation, organizations need to size up the specific potential risks that vulnerabilities pose to their critical assets, according to a new report from RiskSense

Risk 135

How to Understand the Russia Hack Fallout

WIRED Threat Level

Not all SolarWinds victims are created equal. Security Security / Cyberattacks and Hacks

COVID-19 Crisis: How to Manage VPNs

Data Breach Today

Practitioners Share Insights on How They're Addressing VPN Shortcomings Security practitioners around the world are struggling to cope with the challenges posed by remote workers heavily relying on virtual private networks during the Covid-19 pandemic. Here's a look at steps to take to help enhance security

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

How Amazon Sidewalk Works—and Why You May Want to Turn It Off

WIRED Threat Level

Gear Gear / How To and Advice SecurityThe premise is convenient. But the e-commerce giant's privacy track record isn't exactly inspiring.

Cloud Protection: How to Secure Server Environments

Data Breach Today

Jake King of Cmd Charts the Evolution of Cloud Workload Protection Platforms Development teams are increasingly building and deploying for the cloud, but DevOps practices too often fail to account for what happens after applications go from development into production and maintenance - and the ongoing security challenges they will face, says Jake King, CEO, of Cmd

Cloud 157

How to Achieve Collaboration Tool Compliance

Dark Reading

Organizations must fully understand the regulatory guidance on collaboration security and privacy so they can continue to implement and expand their use of tools such as Zoom and Teams

How to delight customers with engaging experiences

OpenText Information Management

Too often, when customers reach out for help in solving a problem or completing a business task, they feel dread in anticipation of the experience they might encountered to solving their problem. What are your customers experiencing when they call your customer service team?

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. This eBook discusses a newly discovered information discipline and is filled to the brim with helpful information.

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

As adults, we know that bad online decisions can have negative or dangerous effects for years to come. Related: Web apps are being used to radicalize youth. The question isn’t whether we should educate children about online safety, but how we can best inspire them to learn to be thoughtful, careful, and safe in the cyber world for their lifetime. Here are some tips to excite kids about cybersecurity. Who do they like to communicate with onlin.

How to: Find and Clean out Your Dark Data with


We talk a lot about how you need to get control of the dark data spread across disconnected silos in your company. Now let’s show you how you can do with our tools; in this case, with is our file analytics product, and it’s very easy to use. You can connect to multiple repositories, index all the content in those repositories, search, classify and organize the content. Want to see up close?

ROT 62

How to Avoid Unnecessary Breach Reporting

Data Breach Today

Healthcare organizations need to diligently assess whether a security incident involving patient information truly qualifies as a reportable breach under HIPAA to avoid needlessly reporting it to federal regulators, says regulatory attorney Helen Oscislawski

How to Pay a Ransom

Dark Reading

Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your organization has fallen victim and is going to pay. Here's how to handle it

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Friction Affliction: How to Balance Security With User Experience

Dark Reading

There's a fine line between protecting against suspicious, malicious, or unwanted activity and making users jump through hoops to prove themselves

Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas

Dark Reading

It's past time to begin charting insider risk indicators that identify risky behavior and stop it in its tracks

Risk 87

How to boost your Cyber Essentials certification

IT Governance

Its practical approach helps you manage basic cyber security concerns, such as detecting and preventing malware, patching software vulnerabilities, avoiding unauthorised access to systems and networks and improving secure configuration.

How to Stay Secure on GitHub

Dark Reading

Here are ways to keep your development team from getting burned on GitHub GitHub, used badly, can be a source of more vulnerabilities than successful collaborations.

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

How to become a data protection officer

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

Coronavirus: How to Plan and Protect

Data Breach Today

But the key stat to watch is the mortality rate, currently 2 percent, says pandemic expert Regina Phelps. How that number changes will dictate how business continuity leaders must respond The coronavirus statistics are dizzying - as of Thursday, there were more than 28,000 infections and about 560 deaths.


How to Secure Machine Learning

Dark Reading

Part two of a series on avoiding potential security risks with ML

Risk 81

Zynga's Breach Notification: How to Not Inform Victims

Data Breach Today

Don't Blame Us, Blame Hackers, Mobile Gaming Giant Says "Cyberattacks are one of the unfortunate realities of doing business today," reads gaming company Zynga's data breach notification, thus breaking the first rule of crisis management: Own your mistakes. Not least because hacker Gnosticplayers claims the company was still storing passwords using outdated SHA1

Best Practices for Accelerating the Sales Process

This eBook takes a look at three headache-free strategies you can employ today to accelerate selling the right way. Read on to learn how to adopt specific workflows and approaches that append your existing processes to deliver value to your prospects and internal counterparts.

How to Make the Most of Cyber Intelligence

Data Breach Today

Jeff Bardin of Treadstone 71 Outlines Key Strategic Steps Creating a cyber intelligence strategy involves operational and tactical measures as well as technical approaches, says Jeff Bardin, chief intelligence officer at Treadstone 71


How to Build Cyber Resilience in a Dangerous Atmosphere

Dark Reading

Our polarized climate and COVID-19 are putting the nation's cybersecurity in imminent danger, and it's past time to act

How to Improve SD-WAN Security

eSecurity Planet

Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps

How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. So here’s a quick refresher course on how to make it through the next few weeks without getting snookered online. Even people who shop mainly at big-name online stores can get scammed if they’re not wary of too-good-to-be-true offers.

The ABC’s of Recruiting for Gen Z

Take a look around you at any given moment, and somebody is likely surfing the web on their phone. In 2020, society has fully immersed itself in the web and all it has to offer - and no one more so than those of Generation Z. With “Gen Zers” beginning to enter the workforce at entry-level positions, it’s crucial to understand that this generation operates differently from the last. With this caveat in mind, read on to learn how to adapt your recruiting strategy to appeal to this pool of potential employees.