cybersecurity

10 tips to attract women to infosec jobs

Women make up  just 11 percent of information security professionals.  Just increasing that number to 22 percent would solve the industry’s staffing shortage problem. Unfortunately, at most companies, the recruitment process is designed to attract the kind of people who already work there. Changing that requires conscious effort. Here are some tips that might help. […]

10 tips to attract women to infosec jobs Read More »

You Need to Get Creative With Pen Testing. Here’s How to Do It.

Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common Vulnerability Scoring System is an industry standard, but has been around for a while. The bad guys, however, aren’t limiting themselves to the traditional perimeter attacks anymore. They’re using spear

You Need to Get Creative With Pen Testing. Here’s How to Do It. Read More »

Don’t click on these links

Whether you receive a phishing email inviting you to click on a specific link, whether you see the link on your trusted social media sites, or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on. See slideshow at Network World.

Don’t click on these links Read More »

SaaS vendors, customers, finding new ways to secure the cloud

Rogue employees, hackers, government employees all threats to keeping information stored on the cloud private Edward Snowden’s leaks about NSA spying may have brought the issue of cloud security to broad public attention, but some enterprise users were already concerned about how to take advantage of cloud-based applications while keeping their data safe. As a

SaaS vendors, customers, finding new ways to secure the cloud Read More »

10 encryption tips for the enterprise

Whether you’re protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees accidentally leaving their laptops in a taxi, encryption is today’s hot go-to tool. But encryption done wrong can be worse than no encryption at all, since it gives you an

10 encryption tips for the enterprise Read More »

Security Keys

What treasury and finance executives need to know about encryption Treasury and finance executives need to know enough about encryption and security to  ensure that those policies not only match the company’s general attitude towards risk, but  also account for particular risks associated with certain departments and processes. Encryption is a good safety measure because

Security Keys Read More »

Cloudy Outlook

Cloudy Does the cloud help or  hinder credit card payment  security and compliance? Depending on whom you ask, processing  credit card payments in the cloud is either  a great leap forward for security and  compliance, or a big step backward. Actually, it can be  either–depending on the type of cloud you have in  mind and

Cloudy Outlook Read More »