Why Autocorrect for Passwords Is a Great Idea

It’s frustrating when you have to wrack your brain for a correct password and still get locked out of your account after continuous failed attempts. This unfortunate scene actually happens a lot to everyone, sometimes simply because people forget their passwords, but other times due to typos. In order to ...

Read More »

Top 5 Tips to Create a Culture of Security Awareness at Work

Mike Saurbaugh, a faculty member with IANS Research and independent consultant, stresses that companies should not frame their comprehensive security awareness program so much as a compliance task, but rather, a journey that leads to lasting behavioral changes. Employees need to understand their roles in helping the business achieve a ...

Read More »

Bank Fraud: The Game of Cat and Mouse

Impersonation (corporate or user), malware and Trojans, fraudulent emails, black markets, phishing, pharming, trademark abuse… There are myriad vectors of attack cybercriminals use to defraud and obtain a significant booty from the clients of the banking sector. Faced with this situation, the entities must bet on a proactive detection, which ...

Read More »

New Challenges in the Safety of Industrial Control Systems

The technological differences between IT systems and industrial process systems, which have traditionally been treated as completely different disciplines, are disappearing. We find ourselves in a new scenario where both worlds coexist, and where it is no longer enough to rely on the proprietary nature of such technologies. A security ...

Read More »

Red Team: The Best Defense Is a Good Offense

In order to protect business from increasingly numerous and more sophisticated targeted threats, it is necessary to change mentality and evolve towards a more offensive approach that brings greater benefits on a defensive level. Performing realistic intrusion simulations where an external team, the Red Team, simulates the techniques, tactics, and ...

Read More »

Red Team: Thinking like the Enemy

“Know thyself and know thy enemy.” This maxim, drawn from the treatise The Art of War by the Chinese philosopher and military strategist Sun Tzu (2nd century BC), summarizes a few strategies to follow in any conflict. It is also the maxim that underlies the creation of the so-called Red ...

Read More »

Securing Your Computer to the Fullest Extent

The only perfectly secure computer is turned off, disconnected, and kept in a safe. This is true but of no use. If you are looking for something a little more useful, start by considering what kinds of data you are protecting. Most of us are protecting banking, tax and credit ...

Read More »

4 Key IT Trends for CIOs in 2017

The new year comes with new resolutions for CIOs. Innovation is the key in technology, but CIOs should aim for something that drives their companies and leaves other competitors behind. Mark Campbell at the Enterprisers Project points out four hot IT trends that CIOs should focus on in this year: ...

Read More »

Why Private Clouds Aren’t Dead Yet

By the end of 2020, 68% of enterprise workloads will be executed in the public cloud, according to the Cisco Global Cloud Index. Even with that large number, there are still some good reasons to use private cloud systems. In an article from InformationWeek, Charles Babcock explains why this is ...

Read More »