Enabling Better Risk Mitigation with Threat Intelligence
“In order to get the maximum benefit from threat intel you need to be able to operationalize it. Here's how.”
Leveraging Security to Enable Your Business
“When done right, security doesn't have to be the barrier to employee productivity that many have come to expect. Here's how.”
Protecting data means protecting business
“As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.”
Cybersecurity in the Cloud Era
"As CFOs assume greater responsibilities for operational risk management, it’s critical to understand security, privacy, and compliance controls. Here’s the practical guidance needed"
Windows Updates Deliver Intel's Spectre Microcode Patches
"Microsoft announced on Thursday that Windows users will receive the microcode updates released by Intel to patch the notorious Spectre vulnerability.
Trustico States They Stored Private Keys for Customers' SSL Certificates
"Trustico, a reseller of SSL certificates, has stated that they stored the private keys of some of the SSL certificates it issued to its customers over the past years. This came in the form of a statement Trutico posted on its website late last night."
Equifax hack just got worse for a lot more Americans
"An additional 2.4 million Americans have been identified as victims of the company's 2017 breach."
GDPR: Two thirds of organisations aren't prepared for the 'right to be forgotten'
"With new EU data protection legislation just weeks away, a large number of organisations risk fines by being non-compliant."
Half of Orgs Don't Change Security Strategy, Even After an Attack
"That’s according to the CyberArk Global Advanced Threat Landscape Report 2018, in which the security vendor surveyed 1300 IT security decision makers to explore the current state of enterprise security practices."
Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert
"Emerging technologies are rife with opportunities for organizations of all shapes and sizes. Self-driving cars may be some ways into the future still, but connected devices in hospitals, factories and homes are already sharing troves of data for better analytics and decision-making. Workloads are moving to the cloud, and digital personal assistants are becoming commonplace for both enterprises and consumers."
Thorough and Consistent Post-Incident Activity Strengthens Security Posture
"The NIST 800-61 guidelines stress that IR is a cycle, not a linear process. This is exemplified by how post-incident activity feeds directly into the preparation for future events."