Security
Headlines
HeadlinesLatestCVEs

Tag

#InfoSec Insider

Time to Build Accountability Back into Cybersecurity

Chris Hass, director of information security and research at Automox, discusses how to assign security responsibility, punishment for poor cyber-hygiene and IDing 'security champions' to help small businesses.

Threatpost
#Hacks#Malware#Web Security#google#Cloud Security#Privacy#Vulnerabilities#Web Security#Government#Malware#Mobile Security#Vulnerabilities#Web Security#microsoft#Vulnerabilities#Web Security#vulnerability#Critical Infrastructure#Government#Malware#Web Security#Hacks#Malware#Web Security#Cloud Security#InfoSec Insider#Web Security#Government#Malware#Malware#Web Security#Breach#Cloud Security#InfoSec Insider#Malware#Vulnerabilities#Web Security
Mandating a Zero-Trust Approach for Software Supply Chains

Sounil Yu, CISO at JupiterOne, discusses software bills of materials (SBOMs) and the need for a shift in thinking about securing software supply chains.

Incident Response: 5 Principles to Boost the Infosec/Legal Relationship

Effective cyber-incident response means working well with legal. Matt Dunn, associate managing director for cyber-risk at Kroll, lays out how to do it.

4 Key Questions for Zero-Trust Success

Anurag Kahol, CTO & co-founder at Bitglass, offers tips for avoiding implementation pitfalls for zero trust.

How to Build an Incident-Response Plan, Before Security Disaster Strikes

Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack.

Tips & Tricks for Unmasking Ghoulish API Behavior

Jason Kent, hacker-in-residence at Cequence Security, discusses how to track user-agent connections to mobile and desktop APIs, to spot malicious activity.

How to Prevent Account Takeovers in 2021

Dave Stewart, Approov CEO, lays out six best practices for orgs to avoid costly account takeovers.

5 Steps to Securing Your Network Perimeter

Ekaterina Kilyusheva, head of the Information Security Analytics Research Group at Positive Technologies, offers a blueprint for locking up the fortress.

5 Tips for Achieving Better Cybersecurity Risk Management

Casey Ellis, founder, CTO and chairman of Bugcrowd, discusses a roadmap for lowering risk from cyberattacks most effectively.