How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How To 245

How to: Find and Clean out Your Dark Data with everteam.discover

Everteam

We talk a lot about how you need to get control of the dark data spread across disconnected silos in your company. Now let’s show you how you can do with our tools; in this case, with everteam.discover. Everteam.discover is our file analytics product, and it’s very easy to use.

How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. How do you know the lifespan of a site selling that must-have gadget at the lowest price?

How To 279

How to Achieve 'Laser-Cut Fraud Prevention'

Data Breach Today

Trusteer's Avner Gideoni on Creating the Perfect Defensive Blend How do machine learning, threat intelligence and advanced analytics blend together to form agile and accurate fraud prevention?

How To 171

How To Clear Out Your Zombie Apps and Online Accounts

WIRED Threat Level

Here's how to get rid of them. All those services you signed up for but forgot about? They're a security risk. Security Security / Security Advice

Risk 98

OnDemand Webinar | How to Secure Custom Apps Without Code

Data Breach Today

The number one gating factor for true edge compute on mobile is security, and that's a hard thing to get into a mobile app Accelerating the development of secure custom apps without coding.

How to Predict Insider Fraud

Data Breach Today

How To 147

How to eliminate roadblocks to digital transformation

OpenText Information Management

Our second blog covered how to ensure quality data drives your analytics activities. The third examined how you can integrate … The post How to eliminate roadblocks to digital transformation appeared first on OpenText Blogs.

How to Punish Cybercriminals

Schneier on Security

There are approximately 300,000 reported malicious cyber incidents per year, including up to 194,000 that could credibly be called individual or system-wide breaches or attempted breaches. This is likely a vast undercount since many victims don't report break-ins to begin with.

How to handle a ransomware attack

IT Governance

So, your computer screen has been hijacked by criminals who are demanding money to return your systems. That’s a question more organisations are having to ask themselves nowadays, with at least 55 ransomware attacks reported in the first half of 2019. How are they supposed to do work?

How to Maximize Data Used to Fight Fraud

Data Breach Today

Splunk's Jim Apger on Streamlining Omni-Channel Defenses The data being used to drive effective anti-fraud efforts can be rich in context and useful for other activities.

How To 201

New Hacker Exploits and How to Fight Them

Data Breach Today

Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off Dan Larson of Crowdstrike on Battling New Attack Techniques Hackers are constantly developing new exploits, and updating defenses is not an easy task.

How To 169

Beyond 'Black Box' MSSP Security: How to Get the Most

Data Breach Today

Matt Peters of Expel Describes Hybrid Approaches to Security Operations For a managed security service provider to deliver maximum value for customers, it needs to provide a hybrid approach that delivers not only actionable security information but also context, says Matt Peters of Expel

How To 169

Cyber Exposure: How to Discover, Measure and Reduce Your Risk

Data Breach Today

Tenable's Diwaker Dayal on Benchmarking the Success of Your Security Posture How does an organization measure cybersecurity success? For too many, it's simply the absence of a breach.

Risk 192

How to recover from a cyber attack

IT Governance

One in three UK organisations fell victim to a cyber attack in 2018, costing £17.8 Your first – obviously valid – thought might be that we all need to get better at preventing security incidents, but it’s not the whole story. See also: How to handle a ransomware attack.

How to Avoid Card Skimmers at the Pump

Krebs on Security

But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station. Booth said the SAPD has yet to see a skimming incident involving newer pump models like the one pictured directly above.

How To 207

How to make sure your cyber insurance policy pays out

IT Governance

With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Most policies include provisions requiring organisations to follow certain information security best practices.

Expert discovered how to brick all Samsung mobile phones

Security Affairs

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones.

How To 110

Open Source Security - How to Defend at the Speed of Attack

Data Breach Today

On the sixth stop of a multi-city tour, ISMG and Sonatype visited San Francisco for an engaging discussion on how to mitigate risks introduced by open source software. Sonatype CMO Matt Howard discusses the relevance and value of this application security conversation

How To 138

How to Use FDA's Medical Device Cybersecurity 'Playbook'

Data Breach Today

aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp.

How to Protect Our Kids' Data and Privacy

WIRED Threat Level

Opinion: Kids today have an online presence starting at birth, which raises a host of legal and ethical concerns. We desperately need a new data protection framework. Security Security / Privacy Opinion

How to Future-Proof the Critical National Infrastructure

Data Breach Today

Design Cyberattack Resilience Into Technology, Says Professor Prashant Pillai The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pilla

How To 156

How to beat the creative content crunch

OpenText Information Management

With the demand for creative content to support an ever-increasing volume of campaigns and programs on the rise, marketers turn to digital asset management (DAM) solutions to address their creative challenges.

How to deliver operational excellence in utilities

OpenText Information Management

As the energy landscape evolves and wholesale costs continue to rise, utility companies are under increasing pressure to meet the expectations of consumers and shareholders.

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How Does Encryption Work?

Productivity Bytes

The word “encryption” is synonymous with data protection, and most people are aware of its functionality in their day-to-day lives within a digital context. The post How Does Encryption Work? Cybersecurity How-To Tech how-to security

How to Build a Winning Data Platform

Perficient Data & Analytics

What is interesting is that Informatica, known for their products delivering the “Switzerland of Data”, is now using AI capabilities to enhance their own suite of products with CLAIRE capabilities. However, to get there, you need the basics of data platform foundation.

How to Create an Effective Cybersecurity Routine

IG Guru

by James Daily When it comes to your business security and company safety, there’s currently nothing more important than cybersecurity. However, it’s not impossible to stay safe from cyber-attacks and protect your confidential data […].

How to Get the Most out of Datorama

Perficient Data & Analytics

You’ve made the commitment to show measurable results from your marketing efforts. To maximize the value of your marketing ROI measurement, you need a plan. New to Datorama? 5 Ways to Get the Most Out of Datorama. Opportunities routed to partners.

How to view Microsoft Office documents in OpenText ApplicationXtender

OpenText Information Management

The web scanning client brought the latest in OpenText capture technology to ApplicationXtender, including greatly expanded scanning back end control. The release of OpenText™ ApplicationXtender 16.3

How to lose your password

Thales eSecurity

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead.

How to improve your cyber resilience

IT Governance

It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

How to succeed in a career in data governance

Information Management Resources

If you want to transition to a data governance career, it's possible to do so and embark on a path that leads to lasting satisfaction and success.

Expert shows how to Hack a Supra Smart Cloud TV

Security Affairs

Supra Smart Cloud TV allows remote file inclusion in the openLiveURL function, which allows a local attacker to broadcast fake video without any authentication. Technical Observation: We are abusing `openLiveURL()` which allows a local attacker to broadcast video on supra smart cloud TV.

Cloud 84

How to Spring Clean Your Digital Clutter to Protect Yourself

WIRED Threat Level

You don't have to get your hands dirty to do the most important spring cleaning of the year. Security Security / Security Advice

How to create a risk assessment matrix

IT Governance

To comply with ISO 27001 , the international standard for information security, you need to know how to perform a risk assessment. This process is at the core of your compliance measures, as it helps you identify the threats you face and the controls you need to implement.

Risk 79

How to: Setting Up Exceptions for Information Policies in everteam.policy

Everteam

Then you’ve got some work to do. Let’s have a look at how to set up exceptions for information policies. For this article, we will focus on retention rules for multiple jurisdictions, but keep in mind this applies to any type of information policies and its rules.

How to Check Your Computer for Hacked Asus Software Update

WIRED Threat Level

Hackers compromised Asus’s Live Update tool to distribute malware to almost a million people. Here’s how to find out if your computer has it. Security Security / Cyberattacks and Hacks

Tools 79

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks

How To 113

How to unlock enterprise-wide value from data and analytics

Information Management Resources

Organizations need to organize data and analytics teams to reflect their big-picture goals. Data management Analytics Data science