Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and complexity, business leaders are left wondering just how effective their security programs are. After all, we’ve heard it many times before: cybersecurity is not an IT problem, it’s a business risk to manage. There are many approaches to developing and managing a cybersecurity program. Currently,…

Read More

CISO job satisfaction: Finding meaning in the mission

CISO job satisfaction: Finding meaning in the mission

Lena Smart makes the perfect pitch for being a CISO. She talks up the multitude of good opportunities in the field and points to the plethora of interesting challenges that come with the role. She speaks about the strong relationships she has forged as a CISO, and she readily discusses the high levels of trust that exist between her, her team, and the other executives. She also likes that she can set a security strategy…

Read More

New risks, new regulations: Best practices for travel security in 2021

New risks, new regulations: Best practices for travel security in 2021

New risks, new regulations: Best practices for travel security in 2021 | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

The dangers within: What’s hiding in your network?

The dangers within: What’s hiding in your network?

The dangers within: What’s hiding in your network? | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Firewalls, you’re fired

Firewalls, you’re fired

Firewalls, you’re fired | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Three elements of a successful GSOC

Three elements of a successful GSOC

Three elements of a successful GSOC | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Remember a Polaroid? Why Tripwire Keeps this Tradition Alive

Remember a Polaroid? Why Tripwire Keeps this Tradition Alive

We’re going to talk about state versus change. For the purposes of our discussion, you need to know that Tripwire Enterprise offers something called TE Commander. Many enterprise applications lack a native command line interface. This can be a challenge if you want to automate and integrate basic operations, which is a necessary function in most enterprise IT environments. Tripwire® Enterprise (TE) Commander is a cross-platform CLI (Command Line Interface) for Tripwire Enterprise that allows…

Read More

#DEFCON: Exploiting Vulnerabilities in the Global Food Supply Chain

#DEFCON: Exploiting Vulnerabilities in the Global Food Supply Chain

Autonomous farming equipment that can be controlled remotely now helps to feed humanity. But what if that farming equipment were hacked? On August 8, at the DEF CON 29 conference, an Australian researcher known only as ‘Sick Codes‘ detailed what he referred to as a “tractor load of vulnerabilities” that, if exploited by an attacker, would have dire consequences for the global food supply chain. The researcher explained that modern farming equipment is increasingly being…

Read More

#DEFCON: Exploiting Physical Shopping Carts for Denial of Shopping

#DEFCON: Exploiting Physical Shopping Carts for Denial of Shopping

DoS usually is an acronym that refers to Denial of Service, but according to researcher Joseph Gaby, it can also stand for Denial of Shopping. On August 8, at the DEF CON 29 conference, Gabay outlined his research into how physical shopping cart immobilization systems work, and how they can potentially be abused by hackers. He noted that there is some pretty cool technology that most people take for granted every time they go shopping…

Read More

#DEFCON: Why Social Media Security is Election Security

#DEFCON: Why Social Media Security is Election Security

There may be little if any argument about the vast impact that social media platforms have on the lives of hundreds of millions of people around the world. Social media has also had a profound influence on elections. In a session at the DEF CON 29 conference on August 7, Sebastian Bay, a researcher at the Swedish Defence Research Agency (FOI), outlined how social media platforms are failing at limiting the risk of false information…

Read More
1 2,218 2,219 2,220 2,221 2,222 2,651