How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How To 236

How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. How do you know the lifespan of a site selling that must-have gadget at the lowest price?

How To 284

How to Effectively Use AI and ML in Security

Data Breach Today

Group-IB's Aleksandr Lazarenko on Overcoming the Challenges It's difficult to build a reliable security system based on artificial intelligence and machine learning, says Aleksandr Lazarenko of Group-IB, who offers insights on how to make the most of these technologies

How to Prepare for Misconfigurations Clouding the Corporate Skies


With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.

OnDemand Webinar | How to Secure Custom Apps Without Code

Data Breach Today

Accelerating the development of secure custom apps without coding. The number one gating factor for true edge compute on mobile is security, and that's a hard thing to get into a mobile app

How to Shift Security Practices From Monitoring to Observability

Data Breach Today

Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected? Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids?

How To 181

How to Get Your Equifax Settlement Money

WIRED Threat Level

Security Security / Security NewsA settlement with the FTC means Equifax will pay victims of its breach $125 or more. Make sure it pay ups.

How To 112

How to Keep Your Web Servers Secure

Dark Reading

The good news is that Web servers have come a long way in terms of security. But to err is human, even for IT and security people

How To 104

How To Clear Out Your Zombie Apps and Online Accounts

WIRED Threat Level

They're a security risk. Here's how to get rid of them. Security Security / Security AdviceAll those services you signed up for but forgot about?

Risk 105

How to Achieve 'Laser-Cut Fraud Prevention'

Data Breach Today

Trusteer's Avner Gideoni on Creating the Perfect Defensive Blend How do machine learning, threat intelligence and advanced analytics blend together to form agile and accurate fraud prevention?

How To 159

How to manage content chaos

OpenText Information Management

ILTACON has been a staple for legal and IT professionals for over 40 years, and this year’s conference promises not to disappoint. Spend less time searching for … The post How to manage content chaos appeared first on OpenText Blogs. Discovery Enterprise Content Management Information Management Security AI cloud Data ediscovery analytics email enterprise content management Integration OpenText

How to Ensure Your Digital Security During the Rugby World Cup

Thales eSecurity

Now that it’s September, the excitement is beginning to build in earnest for the 2019 Rugby World Cup. Sports fans aren’t the only ones who are looking forward to this event. We urge you to take precautions to protect your personal information when you are on the Internet.

IoT 88

Open Source Security - How to Defend at the Speed of Attack

Data Breach Today

On the sixth stop of a multi-city tour, ISMG and Sonatype visited San Francisco for an engaging discussion on how to mitigate risks introduced by open source software. Sonatype CMO Matt Howard discusses the relevance and value of this application security conversation

Risk 129

Strong, streamlined and secure: How to get the most out of centralized key management

Thales eSecurity

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Using algorithms to encode data as ciphertext, encryption acts as a safety blanket for data.

How Does Encryption Work?

Productivity Bytes

The word “encryption” is synonymous with data protection, and most people are aware of its functionality in their day-to-day lives within a digital context. The post How Does Encryption Work? Cybersecurity How-To Tech how-to security

5 Common Phishing Attacks and How to Avoid Them?

Security Affairs

The emails are designed in a way that it appears to be authentic or belonging from a real business or authoritative source. These emails appear to be coming from some authentic source like from your bank or some legit business organization. Tips to Prevent Phishing.

How to Secure ‘Permissioned’ Blockchains

Thales eSecurity

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. You can also find Duncan’s previous Dark Reading blog, “If blockchain is the answer, what is the security question” here. Data security

How to Prepare for the Brazil Data Protection Law


With the new August 2020 effective date of the Brazil data protection law moving ever closer, organizations subject to its requirements may want to implement changes now, so they will be fully ready.

B2B 52

Cyber Exposure: How to Discover, Measure and Reduce Your Risk

Data Breach Today

Tenable's Diwaker Dayal on Benchmarking the Success of Your Security Posture How does an organization measure cybersecurity success? For too many, it's simply the absence of a breach.

Risk 182

How to Avoid Card Skimmers at the Pump

Krebs on Security

But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station. Booth said the SAPD has yet to see a skimming incident involving newer pump models like the one pictured directly above.

How To 208

How to Build a Cloud Security Model

Dark Reading

Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments

Cloud 85

How to handle a ransomware attack

IT Governance

So, your computer screen has been hijacked by criminals who are demanding money to return your systems. That’s a question more organisations are having to ask themselves nowadays, with at least 55 ransomware attacks reported in the first half of 2019. How are they supposed to do work?

Expert discovered how to brick all Samsung mobile phones

Security Affairs

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones.

How To 104

How to become an ethical hacking master

IT Governance

Does the idea of being paid to hack into organisations’ systems sound appealing? The pay is good, it’s creative and you get to test your skills every day. We’re talking about ethical hacking, one of the most sought-after skills in the cyber security industry.

Security expert shows how to bypass macOS Gatekeeper

Security Affairs

A security researcher demonstrated how to bypass the Apple macOS Gatekeeper by leveraging trust in network shares. The Italian security researcher Filippo Cavallarin demonstrated how to bypass the macOS Gatekeeper by leveraging trust in network shares. The Apple Gatekeeper is designed to protect OS X users by performing a number of checks before allowing an App to run.

Serverless Cloud Security: How to Secure Serverless Computing

eSecurity Planet

Serverless is a new computing paradigm that also introduces new security risks. Learn what serverless is and security steps organizations need to take

Risk 98

How to Manage a Security Operations Center

eSecurity Planet

We define security operations centers (SOCs), including how they should be designed, run and staffed, and the technologies needed to make them work

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background. How can you stand out?

Tips 79

Is Your Browser Secure? Here’s How to Secure Your Web Browser Against Attacks!

Security Affairs

Explorer, Mozilla Firefox, Google Chrome, and Opera, no matter which web browser you use, here’s what you need to know to protect them against attacks. No matter which browser you use there are certain security leaks in each one of them. But have you ever considered the security feature of your browser as a selecting criterion? Have you ever wondered if your browser is secured? How to Secure your Web Browser in just 5 simple ways.

DevSecOps: How to Build Security into Apps

eSecurity Planet

We define DevSecOps, how it relates to DevOps, and how security can be built into the application development process with minimal disruption

How to Spring Clean Your Digital Clutter to Protect Yourself

WIRED Threat Level

You don't have to get your hands dirty to do the most important spring cleaning of the year. Security Security / Security Advice

How to prepare for the California Consumer Privacy Act

Thales eSecurity

state to pass its own data privacy law. A key variation with GDPR is the word “household” which adds more complexity to the implementation of the Act. Similar to GDPR, the CCPA excludes from its scope information that is publicly available. Looking into to the future.

How to document your information security policy

IT Governance

With cyber security affecting businesses worldwide, it is important that all organisations have a policy in place to state and record their commitment to protecting the information that they handle. First, what is an information security policy?

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to lose your password

Thales eSecurity

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead. Data security

How to Keep Your Bitcoin Safe and Secure

WIRED Threat Level

Here's how to protect investment. SecurityBitcoin and other cryptocurrencies have exploded in value—making them an ever-more attractive target for scammers and hackers.

How to Secure US Elections - Before It's Too Late

Data Breach Today

Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns

How to Protect Our Kids' Data and Privacy

WIRED Threat Level

Security Security / Privacy OpinionOpinion: Kids today have an online presence starting at birth, which raises a host of legal and ethical concerns. We desperately need a new data protection framework.

How to Check Your Computer for Hacked Asus Software Update

WIRED Threat Level

Hackers compromised Asus’s Live Update tool to distribute malware to almost a million people. Here’s how to find out if your computer has it. Security Security / Cyberattacks and Hacks

Tools 82

How to Future-Proof the Critical National Infrastructure

Data Breach Today

Design Cyberattack Resilience Into Technology, Says Professor Prashant Pillai The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pilla

How To 146