Weekly InfoSec Roundup 03/02/2018

Enabling Better Risk Mitigation with Threat Intelligence

“In order to get the maximum benefit from threat intel you need to be able to operationalize it. Here's how.”

Read More

 

Leveraging Security to Enable Your Business

“When done right, security doesn't have to be the barrier to employee productivity that many have come to expect. Here's how.”

Read More


Protecting data means protecting business

“As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.”

Read More

 

Cybersecurity in the Cloud Era

"As CFOs assume greater responsibilities for operational risk management, it’s critical to understand security, privacy, and compliance controls. Here’s the practical guidance needed"

Read More


Windows Updates Deliver Intel's Spectre Microcode Patches

"Microsoft announced on Thursday that Windows users will receive the microcode updates released by Intel to patch the notorious Spectre vulnerability.

Read More

 

Trustico States They Stored Private Keys for Customers' SSL Certificates

"Trustico, a reseller of SSL certificates, has stated that they stored the private keys of some of the SSL certificates it issued to its customers over the past years. This came in the form of a statement Trutico posted on its website late last night."

Read More


Equifax hack just got worse for a lot more Americans

"An additional 2.4 million Americans have been identified as victims of the company's 2017 breach."

Read More

 

GDPR: Two thirds of organisations aren't prepared for the 'right to be forgotten'

"With new EU data protection legislation just weeks away, a large number of organisations risk fines by being non-compliant."

Read More

 

Half of Orgs Don't Change Security Strategy, Even After an Attack

"That’s according to the CyberArk Global Advanced Threat Landscape Report 2018, in which the security vendor surveyed 1300 IT security decision makers to explore the current state of enterprise security practices."

Read More

 

Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

"Emerging technologies are rife with opportunities for organizations of all shapes and sizes. Self-driving cars may be some ways into the future still, but connected devices in hospitals, factories and homes are already sharing troves of data for better analytics and decision-making. Workloads are moving to the cloud, and digital personal assistants are becoming commonplace for both enterprises and consumers."

Read More


Thorough and Consistent Post-Incident Activity Strengthens Security Posture

"The NIST 800-61 guidelines stress that IR is a cycle, not a linear process. This is exemplified by how post-incident activity feeds directly into the preparation for future events."

Read More

 

Upcoming Events:  

Register Today!

Register Today!

Stay updated with our blog posts

Enter your email address and you'll be notified about our new posts

  • This field is for validation purposes and should be left unchanged.
© 2019 BRINQA | Legal | Terms