How to Export Your Passwords From LastPass

WIRED Threat Level

If you’d like to move your passwords to another manager, here’s how. Security Gear / How To and Advice Gear / Products / AppsThe popular security service is severely limiting its free tier starting March 16.

Crisis Communications: How to Handle Breach Response

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of why transparent communication in the aftermath of a data breach pays off. Also featured: Mastercard on digital identity issues; building a more diverse and inclusive cybersecurity workforce

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Thinking of a Cybersecurity Career? Read This

Krebs on Security

Thousands of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers are less than thrilled about their hands-on, foundational skills. So what should you focus on, and what’s the best way to get started?

How to Do Data Modeling the Right Way

erwin

Data modeling supports collaboration among business stakeholders – with different job roles and skills – to coordinate with business objectives. What’s desperately needed is a way to understand the relationships and interconnections between so many entities in data sets in detail.

What We Learned From Our Own Data-Driven ABM Strategy

ZoomInfo has created the following eBook to help other B2B organizations gain insights on how to launch their own data-driven ABM strategy. In this eBook, we will reveal the good and the bad from our own campaign and highlight some key takeaways on how to improve your ABM strategies moving forward.

Achieving Seamless eDiscovery

OpenText Information Management

From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline processes and procedures to simplify and thoroughly respond to on-going litigation requests.

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The findings come in a new paper released by researchers at Cambridge University’s Cybercrime Centre , which examined the quality and types of work needed to build, maintain and defend illicit enterprises that make up a large portion of the cybercrime-as-a-service market.

How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How to Implement Microsegmentation

eSecurity Planet

In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the long-term endeavor known as microsegmentation. Approaches to microsegmentation. Approach gradually, with attention to process.

COVID-19 Crisis: How to Manage VPNs

Data Breach Today

Practitioners Share Insights on How They're Addressing VPN Shortcomings Security practitioners around the world are struggling to cope with the challenges posed by remote workers heavily relying on virtual private networks during the Covid-19 pandemic.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Cloud Protection: How to Secure Server Environments

Data Breach Today

Cloud 210

How to Mitigate P2P Payment Fraud

Data Breach Today

2 Experts Discuss Selecting the Right Technologies Validating identity across every digital channel is essential to track money movement information and help control P2P payment fraud, two fraud-fighting experts say

158
158

How to Build a Resilient IoT Framework

Dark Reading

For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges

IoT 95

How to Pay a Ransom

Dark Reading

Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your organization has fallen victim and is going to pay. Here's how to handle it

Ultimate Guide to the Cloud Data Lake Engine

This guide describes how to evaluate cloud data lake engine offerings based on their ability to deliver on their promise of improving performance, data accessibility, and operational efficiency as compared with earlier methods of querying the data lake.

How to Fight Against 'Authorized Payment Fraud'

Data Breach Today

a protocol designed to be an additional security layer for online credit and debit card transactions, by banks and merchants alike can play a critical role in reducing "authorized payment fraud," two security experts say

How to Protect Vulnerable Seniors From Cybercrime

Dark Reading

According to the FBI, people over the age of 60 lose more money to cybercrime than any other age group. The good news: Safety is only three main tips away

106
106

How to Implement Zero Trust

eSecurity Planet

Zero trust has gone from new idea to buzzword and industry paradigm in a decade. As organizations look to strengthen their network security or update their cybersecurity defenses, the gospel of zero trust awaits. . Intro to Microsegmentation.

How to Avoid Phishing Emails and Scams

WIRED Threat Level

It's is a bigger threat than ever. Here are some ways you can defend yourself. Security Security / Security Advice

Top Considerations for Building an Open Cloud Data Lake

In this paper, we explore the top considerations for building a cloud data lake including architectural principles, when to use cloud data lake engines and how to empower non-technical users.

How to Clean Up Your Digital History

WIRED Threat Level

There are plenty of reasons to declutter your online traces. Here's how to tidy up. Security Security / Security Advice

How to Avoid Unnecessary Breach Reporting

Data Breach Today

Healthcare organizations need to diligently assess whether a security incident involving patient information truly qualifies as a reportable breach under HIPAA to avoid needlessly reporting it to federal regulators, says regulatory attorney Helen Oscislawski

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 150

How to Check Your Devices for Stalkerware

WIRED Threat Level

Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder. You deserve privacy. Security Security / Privacy Security / Security Advice

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. This eBook discusses a newly discovered information discipline and is filled to the brim with helpful information.

How to Run a Successful Penetration Test

Dark Reading

These seven tips will help ensure a penetration test improves your organization's overall security posture

Account Takeover: 2021 - and How to Prevent it

Data Breach Today

SpyCloud has fresh research into account takeover trends and finds that attacks have recently spiked by 300%. Chip Witt explains the trends behind the stats and offers insight into what enterprises often are overlooking in their ATO prevention strategies

IT 151

How to Prioritize Vulnerability Patching

Data Breach Today

New Report Asserts That Using CVSS Scores Alone Is Inadequate Rather than focusing solely on rankings offered by the common vulnerability scoring system, or CVSS, when setting priorities for risk mitigation, organizations need to size up the specific potential risks that vulnerabilities pose to their critical assets, according to a new report from RiskSense

Risk 138

How to Make the Most of Cyber Intelligence

Data Breach Today

Jeff Bardin of Treadstone 71 Outlines Key Strategic Steps Creating a cyber intelligence strategy involves operational and tactical measures as well as technical approaches, says Jeff Bardin, chief intelligence officer at Treadstone 71

199
199

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

How to Develop a Metadata Strategy

AIIM

Every system uses metadata to store and retrieve data. But in too many organizations, every system uses similar but different metadata, with the result that different data structures and approaches make information harder to find and manage, not easier. How to Identify Metadata.

How to Understand the Russia Hack Fallout

WIRED Threat Level

Not all SolarWinds victims are created equal. Security Security / Cyberattacks and Hacks

COVID-19: How to Adjust Business Continuity Plans

Data Breach Today

The COVID-19 pandemic present new challenges to healthcare IT and security teams, including the need to reassess and adjust business continuity plans, says Christopher Frenz, who leads information security at New York's Interfaith Medical Center.

Data Governance: How to Tackle Three Key Issues

Data Breach Today

What are the critical issues, and how are they being addressed The Importance of Accountability, Data Inventory and Automation As organizations plot their 2020 cybersecurity strategies, especially in light of privacy regulations, key data governance challenges are emerging.

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

OnDemand | How to Manage Your Third-Party Risk

Data Breach Today

Preventing & Managing Data Leaks The average number of parties with whom an enterprise shares sensitive information is 583, according to the Ponemon Institute.View this webinar to learn about the breadth and implication of third-party data leaks

Risk 150

How to Win Customers and Drive Loyalty With Data

Reltio

Do you find yourself wondering how to win customers in this hyper-competitive, always-on era? In a day and age when it's incredibly easy for customers to switch providers or change loyalties, only customer experience can save you. How to Win Customers: Data Unlocks the Door .

MDM 63

COVID-19 Response: How to Secure a 100% Remote Workforce

Data Breach Today

Cybereason CSO Sam Curry on Business Continuity and Reducing Risk Cybereason CSO Sam Curry is no stranger to crisis - he was on the team that responded to the RSA breach in 2011.

Risk 204

How to Tell Which Emails Quietly Track You

WIRED Threat Level

Your emails know more about you than you might think, like when you open them or when you forward them to others. But you can reclaim your privacy. Security Security / Security Advice Security / Privacy

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!