How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How To 245

How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. How do you know the lifespan of a site selling that must-have gadget at the lowest price?

How To 279

OnDemand Webinar | How to Secure Custom Apps Without Code

Data Breach Today

Accelerating the development of secure custom apps without coding. The number one gating factor for true edge compute on mobile is security, and that's a hard thing to get into a mobile app

How to Shift Security Practices From Monitoring to Observability

Data Breach Today

Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected? Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids?

How To 194

Beyond 'Black Box' MSSP Security: How to Get the Most

Data Breach Today

Matt Peters of Expel Describes Hybrid Approaches to Security Operations For a managed security service provider to deliver maximum value for customers, it needs to provide a hybrid approach that delivers not only actionable security information but also context, says Matt Peters of Expel

How To 169

How To Clear Out Your Zombie Apps and Online Accounts

WIRED Threat Level

They're a security risk. Here's how to get rid of them. Security Security / Security AdviceAll those services you signed up for but forgot about?

Risk 98

Open Source Security - How to Defend at the Speed of Attack

Data Breach Today

On the sixth stop of a multi-city tour, ISMG and Sonatype visited San Francisco for an engaging discussion on how to mitigate risks introduced by open source software. Sonatype CMO Matt Howard discusses the relevance and value of this application security conversation

How To 138

Is Your Browser Secure? Here’s How to Secure Your Web Browser Against Attacks!

Security Affairs

Explorer, Mozilla Firefox, Google Chrome, and Opera, no matter which web browser you use, here’s what you need to know to protect them against attacks. No matter which browser you use there are certain security leaks in each one of them. But have you ever considered the security feature of your browser as a selecting criterion? Have you ever wondered if your browser is secured? How to Secure your Web Browser in just 5 simple ways.

Security expert shows how to bypass macOS Gatekeeper

Security Affairs

A security researcher demonstrated how to bypass the Apple macOS Gatekeeper by leveraging trust in network shares. The Italian security researcher Filippo Cavallarin demonstrated how to bypass the macOS Gatekeeper by leveraging trust in network shares. The Apple Gatekeeper is designed to protect OS X users by performing a number of checks before allowing an App to run.

How to handle a ransomware attack

IT Governance

So, your computer screen has been hijacked by criminals who are demanding money to return your systems. That’s a question more organisations are having to ask themselves nowadays, with at least 55 ransomware attacks reported in the first half of 2019. How are they supposed to do work?

How to Secure ‘Permissioned’ Blockchains

Thales eSecurity

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. You can also find Duncan’s previous Dark Reading blog, “If blockchain is the answer, what is the security question” here. Data security

Expert discovered how to brick all Samsung mobile phones

Security Affairs

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones.

How To 110

Strong, streamlined and secure: How to get the most out of centralized key management

Thales eSecurity

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Using algorithms to encode data as ciphertext, encryption acts as a safety blanket for data.

Cyber Exposure: How to Discover, Measure and Reduce Your Risk

Data Breach Today

Tenable's Diwaker Dayal on Benchmarking the Success of Your Security Posture How does an organization measure cybersecurity success? For too many, it's simply the absence of a breach.

Risk 192

How to recover from a cyber attack

IT Governance

One in three UK organisations fell victim to a cyber attack in 2018, costing £17.8 Your first – obviously valid – thought might be that we all need to get better at preventing security incidents, but it’s not the whole story. See also: How to handle a ransomware attack.

How to Protect Our Kids' Data and Privacy

WIRED Threat Level

Security Security / Privacy OpinionOpinion: Kids today have an online presence starting at birth, which raises a host of legal and ethical concerns. We desperately need a new data protection framework.

Serverless Cloud Security: How to Secure Serverless Computing

eSecurity Planet

Serverless is a new computing paradigm that also introduces new security risks. Learn what serverless is and security steps organizations need to take

Risk 101

Ferpa Compliance In Education: How to Securely Manage Student Records

Record Nations

FERPA was enacted in 1974 and applies to all schools that receive funds from an […]. The post Ferpa Compliance In Education: How to Securely Manage Student Records appeared first on Record Nations. The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C.

How to Manage a Security Operations Center

eSecurity Planet

We define security operations centers (SOCs), including how they should be designed, run and staffed, and the technologies needed to make them work

How to Avoid Card Skimmers at the Pump

Krebs on Security

But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station. Booth said the SAPD has yet to see a skimming incident involving newer pump models like the one pictured directly above.

How To 207

How to Build a Cloud Security Model

Dark Reading

Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments

Cloud 81

How to make sure your cyber insurance policy pays out

IT Governance

With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Most policies include provisions requiring organisations to follow certain information security best practices.

DevSecOps: How to Build Security into Apps

eSecurity Planet

We define DevSecOps, how it relates to DevOps, and how security can be built into the application development process with minimal disruption

How to Spring Clean Your Digital Clutter to Protect Yourself

WIRED Threat Level

You don't have to get your hands dirty to do the most important spring cleaning of the year. Security Security / Security Advice

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background. How can you stand out?

Tips 76

How to document your information security policy

IT Governance

With cyber security affecting businesses worldwide, it is important that all organisations have a policy in place to state and record their commitment to protecting the information that they handle. First, what is an information security policy?

How to Create an Effective Cybersecurity Routine

IG Guru

by James Daily When it comes to your business security and company safety, there’s currently nothing more important than cybersecurity. However, it’s not impossible to stay safe from cyber-attacks and protect your confidential data […].

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to Future-Proof the Critical National Infrastructure

Data Breach Today

Design Cyberattack Resilience Into Technology, Says Professor Prashant Pillai The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pilla

How To 156

Expert shows how to Hack a Supra Smart Cloud TV

Security Affairs

Supra Smart Cloud TV allows remote file inclusion in the openLiveURL function, which allows a local attacker to broadcast fake video without any authentication. Technical Observation: We are abusing `openLiveURL()` which allows a local attacker to broadcast video on supra smart cloud TV.

Cloud 84

How to Keep Your Bitcoin Safe and Secure

WIRED Threat Level

Here's how to protect investment. SecurityBitcoin and other cryptocurrencies have exploded in value—making them an ever-more attractive target for scammers and hackers.

How to Secure US Elections - Before It's Too Late

Data Breach Today

Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns

How to Check Your Computer for Hacked Asus Software Update

WIRED Threat Level

Hackers compromised Asus’s Live Update tool to distribute malware to almost a million people. Here’s how to find out if your computer has it. Security Security / Cyberattacks and Hacks

Tools 79

How to Build a Winning Data Platform

Perficient Data & Analytics

What is interesting is that Informatica, known for their products delivering the “Switzerland of Data”, is now using AI capabilities to enhance their own suite of products with CLAIRE capabilities. However, to get there, you need the basics of data platform foundation.

How Does Encryption Work?

Productivity Bytes

The word “encryption” is synonymous with data protection, and most people are aware of its functionality in their day-to-day lives within a digital context. The post How Does Encryption Work? Cybersecurity How-To Tech how-to security

All the Ways Google Tracks You—And How to Stop It

WIRED Threat Level

Here's how to keep it from knowing your location, web browsing, and more. Security Security / PrivacyGoogle knows more about you than you might think.

How to Stop Robocalls—or At Least Slow Them Down

WIRED Threat Level

Security Security / Security AdviceLet's be honest, you can't kill robocalls completely. But you can block more of them than you might think.

How to lose your password

Thales eSecurity

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead. Data security

How to Safely and Securely Dispose of Your Old Gadgets

WIRED Threat Level

SecurityKeep your data private and the environment protected.

Data 72

How to create an information security policy

IT Governance

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document an information security policy. What is an information security policy?