SolarWinds Breach Reports: 'Just the Tip of the Iceberg'

Data Breach Today

And what he says what he sees so far in the SolarWinds attack may be just the "tip of the iceberg" in terms of government and business entities that have been compromised

Tips on Securing Endpoints, Ensuring Compliance

Data Breach Today

Matthew Burns of HCL Software discusses securing endpoints and ensuring compliance during exceptional times in an interview following a recent series of virtual roundtables on the subject


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Realistic Patch Management Tips, Post-SolarWinds

Dark Reading

Here are tips from the experts on how to wrangle patches in a time of malicious software updates Patch management and testing are different, exactly the same, and completely out of hand.


Coronavirus Update: Tips for Travel

Data Breach Today

But business travelers should avoid panic, says pandemic expert Regina Phelps, who offers preventive health tips for those headed to international events, such as the RSA 2020 conference Globally, the coronavirus has infected more than 75,000 people and led to over 2,000 deaths.


Cold Calling Tips and Tricks

In recent years, cold calling has become synonymous with rejection and failure. But the numbers aren't that clear; while less than 2% of today’s cold calls actually result in meetings, 78% of decision-makers have taken an appointment or attended an event as a result of a cold call. What’s the verdict?

Tips for Implementing Foundational Controls

Data Breach Today

Tripwire's Tim Erlin on Ways to Prevent Breaches Improperly implemented foundational controls pave the way for many data breaches, says Tim Erlin of Tripwire, who offers tips on building a strong foundation

Tips on Building a Robust Data Backup Strategy

Data Breach Today

In light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic.

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

When law enforcement agencies tout their latest cybercriminal arrest, the defendant is often cast as a bravado outlaw engaged in sophisticated, lucrative, even exciting activity.

Coalition Offers Remote Workforce Security Tips

Data Breach Today

Andy Bates of Global Cyber Alliance on 'Work From Home, Secure Your Business' The Global Cyber Alliance is one of 13 nonprofit organizations that have banded together to offer businesses security tips for their newly remote workforces. Andy Bates, executive director of the alliance, discusses the coalition's core guidelines for reducing cyber risk

Risk 125

Tips on Countering Insider Threat Risks

Data Breach Today

Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them?

Risk 130

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

A CISO's Tips on Implementing the 'Zero Trust' Model

Data Breach Today

Siva Sivasubramanian of SingTel Optus on Measuring Success An organization has successfully implemented a "zero trust" framework when it can achieve context-aware resolution of a risk, says Dr. Siva Sivasubramanian, CISO of SingTel Optus, an Australian telecommunications firm

Risk 206

COVID-19 Response: 5 Tips for Securing Remote Workplace

Data Breach Today

Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention.

Tips on Ransomware Defense Strategies

Data Breach Today

Caleb Barlow, CEO of CynergisTek, on Addressing the Challenges Healthcare institutions and nonprofits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up defenses

7 Online Shopping Tips for the Holidays

Dark Reading

These tips will help keep you safe The holidays are right around the corner, and that means plenty of online shopping.


7 Security Tips for Gamers

Dark Reading

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay

'Privacy by Design' Implementation Tips

Data Breach Today

Implementing the concept of "privacy design" requires a series of critical steps, says Heikki Tolvanen, chief legal engineer at PrivacyAnt, a Finland-based privacy consulting firm, who offers insights on mistakes to avoid

Pro Tip: Say What You Know

Dark Reading

During the immediate period following a breach, it's vital to move fast - but not trip over yourself

IT 75

The Edge Pro Tip: Fasten Your Seatbelts

Dark Reading

An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies for 2021. Where do they plan to spend next

Tips for a Bulletproof War Room Strategy

Dark Reading

The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets

8 tips for fostering user centricity in content services

OpenText Information Management

Implementing a content management system that is connected to critical business applications and offers personalized, easy, and secure access to the right information at the right time … The post 8 tips for fostering user centricity in content services appeared first on OpenText Blogs.

Securing Slack: 5 Tips for Safer Messaging, Collaboration

Dark Reading

Here are a few extra tips for keeping data and systems more secure when using Slack Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration.

4 tips for tracking customer experience KPIs

OpenText Information Management

According to a Bain & Company study, companies that excel at customer experience have … The post 4 tips for tracking customer experience KPIs appeared first on OpenText Blogs.

Google Shares Cloud Security Tips

Dark Reading

Anton Chuvakin, head of solution strategy at Google Cloud Security, discusses common cloud security hurdles and how to get over them

Cloud 61

Tips for Getting the Most From an MSSP

Data Breach Today

Cybersecurity consultant Vito Sardanopoli, an experienced CISO, offers top tips How can organizations get the most out of partnering with managed security services providers and avoid common pitfalls?

10 Self-Care Tips During Stressful Times


As we all strive to adjust to the changes that coronavirus has brought to our lives in the past several weeks, I wanted to share some tips about self-care and coping in these uncertain times. Here are a few tips and suggestions for managing stress and staying balanced: Daymark News


Tips for Making Security Technology Purchase Decisions

Data Breach Today

CISO Mark Eggleston shares his tips for making the right purchase decisions How can organizations decide what security technologies best meet their needs?

Expert Tips to Keep WordPress Safe

Dark Reading

The most widely used content management system on the Web relies heavily on plug-ins and add-on software -- and that requires rigorous security measures at every level

7 Summer Travel Security Tips

Dark Reading

With staying safe during the pandemic high priority, it's easy to let your guard down about the security of the devices you take along your travels

7 Tips for Container and Kubernetes Security

eSecurity Planet

Container security pros offer their tips to keep Kubernetes deployments safe and secure

Five Tips to Leverage Information for Better Customer Experience


Twenty years ago, the average consumer used two touchpoints when buying an item, and only 7% regularly used more than four. Today consumers use an average of almost six touchpoints, with nearly 50% regularly using more than four.

7 Tax Season Security Tips

Dark Reading

Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe

7 Tips for Effective Deception

Dark Reading

The right decoys can frustrate attackers and help detect threats more quickly


Tips for Successful Zero-Trust Implementation


Featured InfoSec Insider Web Security always verify complexity david Cannelos ericom implementation micro-segmentation never trust remote browser isolation security model tips Zero Trust"Never trust, always verify" is a solid security concept -- but it's important to realize that putting it into practice can be complex.

IT 66

Home Safe: 20 Cybersecurity Tips for Your Remote Workers

Dark Reading

Empower home office users with these tips How can you protect your precious corporate endpoints from the mysterious dangers that might await when you're not by their side?

6 Tips for Getting the Most From Nessus

Dark Reading

These tips will help you get started Books have been written on using the powerful network-discovery and vulnerability-scanning tool.


7 Online Safety Tips for College Students

Dark Reading

Here are seven tips that will get your digital house in order and keep you safe online this semester Heading back to campus soon?


7 IoT Tips for Home Users

Dark Reading

Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep every one secure

IoT 86

Bug Bounty Hunters' Pro Tips on Chasing Vulns & Money

Dark Reading

From meditation to the right mindset, seasoned vulnerability researchers give their advice on how to maximize bug bounty profits and avoid burnout


3 Tips for Securing Open Source Software

Dark Reading

Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate