Joe Stanganelli - Article Archives - Page 1

4 Ways to Upgrade Your Threat Sharing

December 14, 2016
Top InfoSec brass spoke at the 2016 Advanced Cyber Security Center conference on the importance of collaborative threat sharing.
READ MORE

5 Essential IoT Security Best Practices

October 31, 2016
With IoT security top of mind in the wake of recent IoT-based attacks, here are four tips on improving your Internet of Things security measures.
READ MORE

3 Ways CISOs Can Partner with Chief Data Officers

October 7, 2016
The CISO and the chief data officer must work well together, given the importance of secure data access. Here are tips for fostering a C-suite partnership.
READ MORE

Can Feds Compromise on Data Privacy?

October 5, 2016
As hawkish U.S. legislators seek to weaken encryption, a bill up for consideration welcomes private-sector interests to the table for a "dialogue." But is it a trap?
READ MORE

Selecting a Threat Risk Model for Your Organization, Part Two

September 27, 2016
In the second of a two-part series on threat risk models, we look at Trike, MIL-STD-882E and OCTAVE.
READ MORE

Which Threat Risk Model Is Right for Your Organization?

September 19, 2016
Which threat risk model is right for you? We compare strengths and weaknesses of three popular ones: STRIDE, DREAD and CVSS.
READ MORE

3 Cases of InfoSec Hubris That Led to Big Breaches

September 15, 2016
Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.
READ MORE

3 Best Practices for Protecting Data Better than Hillary Did

July 13, 2016
Hillary Clinton's email scandal offers a reminder of the importance of data protection best practices, like the three we cover here.
READ MORE

3 Data Protection Tips, in Light of Proposed Cybersecurity Laws

July 7, 2016
Proposed cybersecurity legislation is making business owners nervous – with good reason. These tips will help you be prepared no matter what Congress does.
READ MORE

How Bad Is Burr-Feinstein Anti-Encryption Legislation?

June 6, 2016
Proposed anti-encryption legislation known as "Burr-Feinstein," filed in the wake of Apple's legal showdown with the FBI, had broad business ramifications.
READ MORE

National Security Letters and Gag Orders: 5 Tips to Reduce Risk

May 4, 2016
To reduce your government surveillance 'attack surface' and protect customers' data privacy from U.S. government agencies, follow these five tips.
READ MORE

Microsoft Wants to Fix Cloud Security's 'Trust Problem'

June 9, 2015
Microsoft Research could revolutionize cloud security with nascent solutions based on Intel technology.
READ MORE

Making Credit Cards Unhackable

May 7, 2015
Credit card credentials are easy to obtain and difficult to secure. An unhackable credit card could be on the horizon, thanks to technology based on quantum computing.
READ MORE

Will 2015 Be Adobe Flash's Swan Song?

March 23, 2015
Following more critical zero-day exploits, Adobe's Flash platform's place in the enterprise appears as unsecure as the software itself.
READ MORE

The Internet of Things: 3 Security Requirements

November 7, 2014
As the Internet of Things proliferates, so too do IoT-based vulnerabilities and attacks. These three tips will help secure your IoT-enabled network.
READ MORE

Identity and Access Management's Role in Secure Cloud Collaboration

July 1, 2014
As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.
READ MORE

Cyber Insurance Covers That? 7 Items You Might Not Know

April 2, 2014
Data breaches and data losses are just the beginning when it comes to cyber insurance. Policies may also cover such items as data forensics.
READ MORE

Cyber Insurance: 6 Facts You Should Know

March 12, 2014
Protecting your data is one thing, but what about insuring it? If you are considering cyber insurance, here are some facts you need to know.
READ MORE

How to Respond to a Data Breach

March 3, 2014
Here are three do's and two don'ts for responding to a data breach.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|