Social network attacks

Get started

  • Data Breach Preparation and Response: Breaches are Certain, Impact is Not

    In this excerpt from chapter five of Data Breach Preparation and Response: Breaches are Certain, Impact is Not, author Kevvie Fowler discusses the key step to contain a data breach.Continue Reading

  • How a hybrid whitelisting-blacklisting approach can help enterprises

    Allowing known good applications and data isn't enough for enterprises. Beth Musumeci explains why a hybrid whitelisting-blacklisting approach is the best option for security.Continue Reading

  • Securing streaming media provides roadmap for IoT

    When it comes to securing internet of things deployments, companies should take a page from the books of some streaming media services.Continue Reading

  • Risk & Repeat: US accuses Russia of state-sponsored cyberattacks

    In this Risk & Repeat podcast, SearchSecurity editors discuss cyber attribution following the U.S. government's claim that Russia is behind recent state-sponsored cyberattacks.Continue Reading

  • Data breach compensation: What enterprises need to know

    Data breach compensation amounts often fall short of covering the actual damages, especially in a cloud breach. Expert Frank Siemons discusses data breach settlement options.Continue Reading

  • How to prevent ransomware or recover from a ransomware breach

    Ransomware, the latest malware threat with which information security professionals must grapple, is spreading, according to many authorities. This TechGuide explores the nature of the threat and the latest ransomware trends. But it does more than merely raise the alarm: Included in this primer on ransomware is also actionable intelligence on both ransomware prevention and recovery. It outlines several steps information security pros should take now in order to heighten their company's resistance and prevent ransomware attacks. It also guides information security pros through recovery steps if they are indeed victims of a ransomware attack.

    Readers of this guide will gain a deeper insight into the nature of ransomware and how it's changing and spreading. But they will also be better equipped to prevent ransomware attacks and possess crucial knowledge to guide them in the event of a ransomware attack on their corporate systems.

    Continue Reading

  • SMB mobile strategies hit roadblocks

    "Go big or go home" is a common battle cry for people taking on a new challenge, but when it comes to enterprise mobility, some organizations just have to go small. Small and medium-size businesses don't have the capital to buy expensive mobility services, hire in-demand developers or recover from major security breaches. Fortunately, there are some products out there that can help -- and an SMB mobile strategy should focus on security capabilities first and foremost.

    Meanwhile, many larger companies are looking to the top enterprise software vendors for guidance when mobilizing their core business apps. In his column this month, Eric Klein explores how SAP, Oracle, IBM and Microsoft are making moves to help IT tailor essential software for smartphones and tablets. The next steps are ensuring that mobile application code is secure and threat detection software is in place, which Maribel Lopez tackles in her column. This issue's Device Spotlight takes a look at a 2-in-1 tablet from Huawei as the company gains a foothold in the United States. We also look ahead to a few conferences end-user computing pros should consider attending in the final months of the year.

    Continue Reading

  • DevOps and security? Here's how

    The automation of development and operations processes, known as DevOps, is catching on in project teams and business units across industries. The missing component in many of these high-risk scenarios? Security. To make DevOps and security work together, CISOs need to have ongoing collaboration with developers, automating security checks early in the process and providing them with visibility and feedback. In this issue, early adopters of the DevOps and security model share tips on how to defend the cloud's continuous improvement model.

    Retailers, led by Wal-Mart Stores, Home Depot and the National Retail Federation, contend that the two-factor authentication provided by chip and PIN card technology offers the highest level of security. Financial institutions, led by Visa, MasterCard and the American Bankers Association, say it's the microchip embedded in the card that matters because it combats counterfeit fraud. We look at both sides of the chip and PIN card debate.

    The consequences of a company's failure to stay apprised of data protection laws and to implement best practices can be dire. Organizations may find themselves not only targets of post-breach lawsuits, but on the receiving end of the Federal Trade Commission's scrutiny. By pooling the collective knowledge of the legal and IT security organizations, and by staying on top of requirements and updating them as appropriate, CISOs can cover all of their bases in a comprehensive way. We tell you how to set up the swim lanes of a legal partnership.

    Continue Reading

  • A look at the cloud migration challenges enterprises could face

    One of the most common problems facing organizations is dealing with many cloud migration challenges. Expert Dave Shackleford discusses the challenges and how to deal with them.Continue Reading

  • CISO challenges: Addressing cybersecurity blind spots

    Every enterprise has cybersecurity blind spots that it fails to recognize and address. Sean Martin explains what they are and how they create more CISO challenges.Continue Reading

  • IT security service provider taps Kaseya to deliver cloud offerings

    Internet & Telephone, a managed service provider, is offering its customers cloud-based IT security services through Kaseya's IT management platform tech.Continue Reading

  • To prep for OCR HIPAA audits, try tech risk assessment

    Weighing technology risks can help healthcare organizations stay ahead of 2016 HIPAA audits by the Department of Health and Human Services' Office for Civil Rights.Continue Reading

  • The adoption of cloud in healthcare from a CIO's view

    CIO Harun Rashid discusses the adoption of cloud in healthcare as well as the barriers and concerns many health IT professionals have when it comes to cloud computing.Continue Reading

  • Information Governance and Security: Protecting and Managing Your Company's Proprietary

    In this excerpt of Information Governance and Security, authors John G. Iannarelli and Michael O'Shaughnessy offer tips for establishing guidelines for all departments or sectors of a business.Continue Reading

  • Before tackling secure texting in healthcare, change culture

    Experts say that while lip service for secure communications technology is great, the first step is convincing leaders and clinicians to recognize the risks to health data.Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close