information security

Five security mistakes and how to prevent them

Sometimes it’s just a matter of changing your password more often. Security breaches have become distressingly common in recent years, compromising everything from employment records (security specialist RSA in 2011) to payment card information (Home Depot in 2014). And they’re becoming more complex and lethal, according to the recently released 2017 Verizon Data Breach Digest. …

Five security mistakes and how to prevent them Read More »

Minority report: Pre-crime technology has arrived

Remember the movie Minority Report, where advanced analytics and supercomputing was able to predict where the next crime would take place and a special police unit was able to arrest murderers before they committed their crime? Well, that technology is not just for Hollywood anymore. Pre-crime technologies are already here The following pre-crime technologies already …

Minority report: Pre-crime technology has arrived Read More »

AI-powered application security testing: Get the buzz on the fuzz

It can help developers create quality software and uncover bugs that other tools cannot.  Over 1,000 companies have signed up to preview it.  It’s called Project Springfield and is creating quite a buzz on fuzz testing.  Read on to get the scoop. What it is First of all, fuzz testing, or fuzzing, is essentially a …

AI-powered application security testing: Get the buzz on the fuzz Read More »

4 new CRMs your sales team should be looking at

Customer relationship management (CRM) refers to the practices, strategies, and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers, assisting in customer retention, and driving sales growth. CRM systems are designed to compile information on customers across different channels, …

4 new CRMs your sales team should be looking at Read More »

Why you should work for a company that cares about information security

Not a month goes by these days without hearing in the news about a high-profile hack attack of a major national brand. As an employee why should you care about working for a company that invests in information security? Information is the heart of any organization, and yet each year, companies stand to lose millions …

Why you should work for a company that cares about information security Read More »

Are cryptocurrencies really secure?

Crypto means hidden, or secret. When you apply that to money, it has a certain sort of appeal, doesn’t it? Well, have you heard about cryptocurrencies yet? If not, here’s my favorite definition from Investopedia. Cryptocurrency is “a digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of …

Are cryptocurrencies really secure? Read More »

Security Protection Protection Privacy Seminar Conference Learning Concept

Why end user training is critical in battle for information security

Author:  Kathryn Packer Earlier this year hackers created a number of false transfer instructions from a bank in Bangladesh to send a total of $951 Million dollars to various bank accounts worldwide. They succeeded in stealing $101 Million before the fraud was detected. How did they get into the Bank’s system? Investigators believe that it …

Why end user training is critical in battle for information security Read More »

RSA 2016: Strategic risk management for the security-savvy enterprise

Author:  Bar Lockwood, CISA, CISM Compared to last year’s doom and gloom, the 2016 RSA Conference, held between February 29 and March 4 in San Francisco, was cautiously optimistic. Celebrating its 25th Anniversary, 40,000 participants enjoyed continuous content presented in hundreds of sessions covering nearly 30 interest areas. But certain topics drew like moths to …

RSA 2016: Strategic risk management for the security-savvy enterprise Read More »

hand presses on screen digital tablet

InfoSec 101: Accessing the internet – Safely.

Author:  Jeffrey M. Jones, CISSP, CISA Even if you don’t work in the Information Technology or Information Security space, it’s important to understand the risks posed how and where you access the Internet. From hospitals to airports to departments stores to fast food restaurants, Wi-Fi access is available for free just about everywhere. But make …

InfoSec 101: Accessing the internet – Safely. Read More »