Social engineering: Is security focused on the wrong problem?

Security Awareness Training and Internal Threats-Information

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Privacy laws in the workplace: Creating employee privacy policies

    Are your employees aware of their workplace privacy rights? More specifically, are they aware of what privacy rights they don't retain? Learn how to create effective employee privacy policies in this expert response. 

  • Employee compliance: Creating a compliance-focused workforce

    If your security team is low on time and money, one of the best things you can do is recruit more people: an entire enterprise worth's. In this tip, learn how to engage corporate employees to be secure themselves and to help enforce compliance best p... 

  • Defining an incident response process when short staffed

    The incident response process can be difficult when short staffed. In this tip, learn how to put together a computer security incident response team by leveraging other departments in your organization. 

  • National Computer Security Center (NCSC)

    The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensit... 

  • Face-off: Is end-user education worth the effort?

    In this face-off, security experts Hugh Thompson, Founder of People Security, and Adam Shostack, co-author of "The New School of Information Security," discuss whether user security awareness training is worth the time, effort and resources. 

  • Creating a proactive enterprise security incident response program

    Every organization should develop a proactive security incident response program to ensure that when an incident does occur, it can be handled quickly and efficiently. Contributor Marcos Christodonte II explains how. 

  • Information security program development: Security vs. compliance

    Some enterprises can be compliant for their audits, but let security slip the rest of the time. In this expert response, Ernie Hayden explains how to get your enterprise to focus on security rather than just compliance. 

  • CISOs take measured steps to reduce social media risks

    With sales and marketing teams using social networks to connect with clients and potential customers, CISOs need to meet business needs while addressing risks. 

  • Enterprise social networking: Schneier-Ranum face-off

    Is there a way that enterprises can allow social networking securely, or are sites like Facebook and Twitter simply too risky for enterprise consumption? Security experts Bruce Schneier and Marcus Ranum discuss. 

  • Health Net breach failure of security policy, technology

    Investigators should question why an external hard drive contained seven years of data, but IT security should have had the appropriate security policies and technologies in place to enforce them.