How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. How do you know the lifespan of a site selling that must-have gadget at the lowest price?

How To 284

Beyond 'Black Box' MSSP Security: How to Get the Most

Data Breach Today

Matt Peters of Expel Describes Hybrid Approaches to Security Operations For a managed security service provider to deliver maximum value for customers, it needs to provide a hybrid approach that delivers not only actionable security information but also context, says Matt Peters of Expel

How To 155

How to Punish Cybercriminals

Schneier on Security

There are approximately 300,000 reported malicious cyber incidents per year, including up to 194,000 that could credibly be called individual or system-wide breaches or attempted breaches. This is likely a vast undercount since many victims don't report break-ins to begin with.

How to Predict Insider Fraud

Data Breach Today

How To 141

How to Maximize Data Used to Fight Fraud

Data Breach Today

Splunk's Jim Apger on Streamlining Omni-Channel Defenses The data being used to drive effective anti-fraud efforts can be rich in context and useful for other activities.

How To 180

Cyber Exposure: How to Discover, Measure and Reduce Your Risk

Data Breach Today

Tenable's Diwaker Dayal on Benchmarking the Success of Your Security Posture How does an organization measure cybersecurity success? For too many, it's simply the absence of a breach.

Risk 176

How to beat the creative content crunch

OpenText Information Management

With the demand for creative content to support an ever-increasing volume of campaigns and programs on the rise, marketers turn to digital asset management (DAM) solutions to address their creative challenges.

New Hacker Exploits and How to Fight Them

Data Breach Today

Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off Dan Larson of Crowdstrike on Battling New Attack Techniques Hackers are constantly developing new exploits, and updating defenses is not an easy task.

How To 151

How to lose your password

Thales eSecurity

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead.

How to Use FDA's Medical Device Cybersecurity 'Playbook'

Data Breach Today

aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp.

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to Future-Proof the Critical National Infrastructure

Data Breach Today

Design Cyberattack Resilience Into Technology, Says Professor Prashant Pillai The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pilla

How to improve your cyber resilience

IT Governance

It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

DevSecOps: How to Build Security into Apps

eSecurity Planet

We define DevSecOps, how it relates to DevOps, and how security can be built into the application development process with minimal disruption

How to achieve cost effective content localization

OpenText Information Management

Executing successful global digital marketing campaigns can be a complex nightmare even for the most digitally savvy organization.

How to create a risk assessment matrix

IT Governance

To comply with ISO 27001 , the international standard for information security, you need to know how to perform a risk assessment. This process is at the core of your compliance measures, as it helps you identify the threats you face and the controls you need to implement.

Risk 76

Experts demonstrate how to exfiltrate data using smart bulbs

Security Affairs

The experts focused their study on devices using the Low Energy Attribute Protocol ( ATT ) to communicate. In this way, the researchers discovered the commands sent by the mobile app to the smart bulbs. The stolen information is sent to an attacker using a BLE light bulb nearby.”

How To 113

How to Secure ‘Permissioned’ Blockchains

Thales eSecurity

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. The post How to Secure ‘Permissioned’ Blockchains appeared first on Data Security Blog | Thales e-Security.

How to write a disaster recovery plan

IT Governance

All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover.

Torrent Risks: How to get infected through torrent with a good reputation

Security Affairs

At the time, only a few people had the capability to access to these illegal networks. Cybaze-Yoroi Z-Lab researchers conducted a study on the risks related to the use of the BitTorrent protocol to download movies, games or pirated software.

How to build a cyber incident response team

IT Governance

Having a cyber incident response team ready to go can save your organisation from disaster. Crooks are constantly poised to exploit vulnerabilities and employees use complex IT systems where mistakes are bound to happen. How to assemble the team. How to get started?

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks

How To 113

How to Use the NIST Cybersecurity Framework

Data Breach Today

Specific Actions for Organizations to See Success in their Cybersecurity Programs By focusing on the cybersecurity actions, NIST CSF can be flexibly deployed regardless of the setting or industry

Strong, streamlined and secure: How to get the most out of centralized key management

Thales eSecurity

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Using algorithms to encode data as ciphertext, encryption acts as a safety blanket for data.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. How much experience do you need? You should try to take an internship or volunteer, but we understand this isn’t always possible.

Tips 73

How to Reduce Your Carbon Footprint With Document Scanning

Record Nations

Despite recent growth in technology paper consumption also continues to grow, however with document scanning digital files not only make your records management more sustainable, but also cheaper and more efficient.

How to Protect Your Sensitive Information

Quest Software

Learn how to identify your risks, which systems contain sensitive data and make appropriate decisions on how to ensure your data is secure.

Risk 52

The Marriott Hack: How to Protect Yourself

WIRED Threat Level

Up to 500 people's personal information has been stolen in a Marriott hack that lasted four years, one of the biggest breaches yet. Security

How to prepare for a penetration test

IT Governance

Rather, it requires a lot of skill and experience, as testers need to know what vulnerabilities to look for, where to find them and how to exploit them. All testers should follow a series of steps to guide them through the process, which we’ve outlined here.

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data.

Inside Matrix and Emotet: How They Work, and How to Defend

Data Breach Today

Matrix is a targeted ransomware, an emerging type of attack Sophos expects to gain prominence, and Emotet is malware that has evolved over the years into an opportunistic, polymorphic threat that can wreak havoc in many different ways. How do these threats work, and how should you bolster your defenses? Sophos is out with new reports on Matrix and Emotet , two different types of cyberattacks that are hitting enterprise defenses.

Cryptocurrency Miners: How to Shield Browsers From Bad Guys

Data Breach Today

Browsealoud Subversion Points to Larger Trust Issues With Third-Party Code Attackers recently snuck cryptomining code onto thousands of websites by inserting it into a third-party accessibility plug-in called Browsealoud.

How to claim compensation for a data protection breach

IT Governance

Organisations need to be much clearer about what information they’re processing, what it’s being used for and how data subjects can review and request changes to their data. You might therefore prefer to make a claim directly.

How to document your information security policy

IT Governance

With cyber security affecting businesses worldwide, it is important that all organisations have a policy in place to state and record their commitment to protecting the information that they handle. The board and management have to be completely behind and committed to the ISMS.

How to Properly Back Up Your Data

Record Nations

According to Forbes, 90% of all data has been created in the last two years, and by the year 2020, one-third of all data will pass through the cloud. All data that you are responsible for needs to be backed up, safely and securely. […].

Cloud 52

How to get more business value from your cloud investment

DXC Technology

Is your organization looking to get more business value from its investments in the cloud? While there’s no universal approach for moving to the cloud, there are many proven ways to get the most value. Join the club. These include approaching the cloud not as a technology move, but as a business decision. This makes […]. Cloud DevOps Platform hybrid cloud ROI

Cloud 65

How to start implementing artificial intelligence

Information Management Resources

A bottoms-up, grassroots approach can kick-start the use of advanced technology by gaining experience with proof-of-concept pilots. Artificial intelligence Machine learning Data management

How to choose the best predictive analytics software in 2019

OpenText Information Management

If they’d had access to the latest predictive analytics solutions, things may have worked out very differently for their companies. Predictive analytics allows you to gain actionable insight from historical data to accurately predict future outcomes.

How to Secure US Elections - Before It's Too Late

Data Breach Today

Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns

How to Effectively Drive Adoption of Artifical Intelligence in Healthcare


A new report by Duke University Margolis Center for Healthcare sheds some light on the current state of artificial intelligence technology in healthcare as well as how to drive adoption of AI-based clinical support tools. Learn more here. Healthcare News AI artificial intelligence healthcare

Tools 40