Information Security

Have you updated your cyber policies for remote work?

We received a notice from one of our clients today detailing their expectations for vendors visiting their locations in this time of pandemic. It made me think about other policies that may need updating for the times. For instance, do your cybersecurity policies, standards, and procedures address remote work? If not, now is a good …

Have you updated your cyber policies for remote work? Read More »

Back view of business woman writing internet of things on white wall background, asian

Cyber security training for work at home employees, can it make a difference?

Last year I was going to write an article about being squeezed up next to somebody else on an airplane and how easy it was to see everything they were doing on their computer. As a security awareness trainer I was curious what a bad actor might be able to discover and take advantage of in such …

Cyber security training for work at home employees, can it make a difference? Read More »

Security Tips for Remote Work

Security tips for a remote workforce during COVID19

With the increased need to work from home and a heightened sense of urgency during this pandemic, more and more organizations are being affected by security events. Follow these suggestions to mitigate risk and keep your company secure. 1. Increase your vigilance The recent remote workforce boom has many people adapting quickly to change and …

Security tips for a remote workforce during COVID19 Read More »

Code on a computer screen

Replaying security: From manual test requests to test scripts

Kalles Group Pen Tester Stan Steenhuis, describes how the investment in constructing custom test requests can be turned into repeatable scripted tests. By adding this process into your pen testing methodology, you can easily develop your existing custom test collection and empower other pen testers on your team to perform these tests. Discovering a significant …

Replaying security: From manual test requests to test scripts Read More »

protect trade secret concept: folder secured with padlock

What everyone needs to know about the Equifax Breach

Author:  Nic Baus Everyone knows how precious your credit rating can be and how much it can swing you getting a loan for a house, car or even a simple retail credit card. There are three major credit reporting agencies that hold this control, Equifax, TransUnion and Experian. They have everyone’s personal information ranging from …

What everyone needs to know about the Equifax Breach Read More »

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service?

By Todd Barnes For those of you that may know Springfield does not refer to the lovely locale in Illinois, Missouri or even Oregon for that matter. Springfield for my context refers to the code name for what is now Microsoft Security Risk Detection (MSRD) – a newly released Security as a Service offering. Springfield …

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service? Read More »

Five security mistakes and how to prevent them

Sometimes it’s just a matter of changing your password more often. Security breaches have become distressingly common in recent years, compromising everything from employment records (security specialist RSA in 2011) to payment card information (Home Depot in 2014). And they’re becoming more complex and lethal, according to the recently released 2017 Verizon Data Breach Digest. …

Five security mistakes and how to prevent them Read More »

illustration of analysing of hand scanning on abstract background

Oracle HRMS and automation of identity provisioning

In most organizations, a primary responsibility of the Identity and Access Management group is to provision new users in Active Directory and Exchange, modify existing users, and terminate users in (almost) real-time when employees leave the organization. What is a Human Resource Management System? Human Resources departments in modern enterprises commonly leverage Human Resource Management …

Oracle HRMS and automation of identity provisioning Read More »

Minority report: Pre-crime technology has arrived

Remember the movie Minority Report, where advanced analytics and supercomputing was able to predict where the next crime would take place and a special police unit was able to arrest murderers before they committed their crime? Well, that technology is not just for Hollywood anymore. Pre-crime technologies are already here The following pre-crime technologies already …

Minority report: Pre-crime technology has arrived Read More »