Kalles Group

Effective new trends in training and instruction design

By Jeanette Rogers Interacting with your phone. Playing online games. Watching 2-minute videos. A casual observer might think you’re distracted but it might mean you’re actively learning new skills. The traditional training method with an instructor lecturing in front of participants for an hour or more has been on the decline for decades. And now, …

Effective new trends in training and instruction design Read More »

protect trade secret concept: folder secured with padlock

What everyone needs to know about the Equifax Breach

Author:  Nic Baus Everyone knows how precious your credit rating can be and how much it can swing you getting a loan for a house, car or even a simple retail credit card. There are three major credit reporting agencies that hold this control, Equifax, TransUnion and Experian. They have everyone’s personal information ranging from …

What everyone needs to know about the Equifax Breach Read More »

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service?

By Todd Barnes For those of you that may know Springfield does not refer to the lovely locale in Illinois, Missouri or even Oregon for that matter. Springfield for my context refers to the code name for what is now Microsoft Security Risk Detection (MSRD) – a newly released Security as a Service offering. Springfield …

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service? Read More »

Security Protection Protection Privacy Seminar Conference Learning Concept

Why end user training is critical in battle for information security

Author:  Kathryn Packer Earlier this year hackers created a number of false transfer instructions from a bank in Bangladesh to send a total of $951 Million dollars to various bank accounts worldwide. They succeeded in stealing $101 Million before the fraud was detected. How did they get into the Bank’s system? Investigators believe that it …

Why end user training is critical in battle for information security Read More »

RSA 2016: Strategic risk management for the security-savvy enterprise

Author:  Bar Lockwood, CISA, CISM Compared to last year’s doom and gloom, the 2016 RSA Conference, held between February 29 and March 4 in San Francisco, was cautiously optimistic. Celebrating its 25th Anniversary, 40,000 participants enjoyed continuous content presented in hundreds of sessions covering nearly 30 interest areas. But certain topics drew like moths to …

RSA 2016: Strategic risk management for the security-savvy enterprise Read More »

hand presses on screen digital tablet

InfoSec 101: Accessing the internet – Safely.

Author:  Jeffrey M. Jones, CISSP, CISA Even if you don’t work in the Information Technology or Information Security space, it’s important to understand the risks posed how and where you access the Internet. From hospitals to airports to departments stores to fast food restaurants, Wi-Fi access is available for free just about everywhere. But make …

InfoSec 101: Accessing the internet – Safely. Read More »