Sophos Launches Security Heartbeat To Bring Together Network, Endpoint Capabilities

By Security Partner . 9 Nov 2015

by Sarah Kuranda Sophos is launching a new technology Monday that synchronizes threat intelligence and automation across endpoint and network levels. Sophos Security Heartbeat, part of the Oxford, England-based company’s new XG firewall series, links together the company’s next-generation firewall and UTM solutions with its next-generation endpoint technologies. In doing that, the company said, it is … Continue reading Sophos Launches Security Heartbeat To Bring Together Network, Endpoint Capabilities

Cover your top 7 basic security threats first

By Michelle Drolet . 2 Nov 2015

When it comes to infosec, many of the most core basics are being overlooked. Many of the most obvious areas where security can be tightened up with little effort are being blatantly ignored. Are you doing your level best by covering the basics? Below are seven potential vulnerabilities. Most of these can be tackled without … Continue reading Cover your top 7 basic security threats first

How CSC can help build your InfoSec framework

By Michelle Drolet . 28 Oct 2015

Critical Security Controls is a set of best practices devised by the Center for Internet Security, a nonprofit dedicated to improving cybersecurity in the public and private sectors.   Cyberattacks are costing businesses between $400 billion and $500 billion per year, depending on which analysts you listen to. Cybersecurity has never been a hotter topic. … Continue reading How CSC can help build your InfoSec framework

The evil that lurks inside mobile apps

By Michelle Drolet . 16 Oct 2015

The Enterprise is at risk from malware and vulnerabilities hiding within mobile apps. You have to test your mobile apps to preserve your security.   Mobile apps are ubiquitous now, and they offer a range of business benefits, but they also represent one of the most serious security risks ever to face the enterprise. The … Continue reading The evil that lurks inside mobile apps

5 myths about data encryption

By Michelle Drolet . 24 Sep 2015

Encryption has a bad rap and far too often protection schemes are deployed foolishly without encryption in hopes of protecting data.   t’s a heartache, nothing but a heartache. Hits you when it’s too late, hits you when you’re down. It’s a fools’ game, nothing but a fool’s game. Standing in the cold rain, feeling … Continue reading 5 myths about data encryption

‘Get Smart’ when it comes to using cloud-based services for file sharing

By Michelle Drolet . 10 Sep 2015

Encrypting data on your own might be the smartest move.   For those of you old enough to remember the TV comedy series “Get Smart” featuring a spy that used his shoe for a phone, the good guys belonged to an agency called “Control,” and the bad guys were affiliated with “Chaos.” This month “Get … Continue reading ‘Get Smart’ when it comes to using cloud-based services for file sharing

10 Things I Know About… Mass. data security rules

By Michelle Drolet . 31 Aug 2015

10. You need a WISP. A written information security policy, or WISP, is vital. Make sure there’s a person in charge of enforcing it. 9. Always encrypt data. Sensitive data, especially personally identifiable information, must be encrypted at all times, from the server, to the cloud, to a laptop or USB drive. 8. Check your … Continue reading 10 Things I Know About… Mass. data security rules

Why every business needs a WISP

By Michelle Drolet . 19 Aug 2015

Non-compliance is a risk, and the Attorney General’s office carries a big stick for those who don’t follow the rules.   If you don’t have a written information security program (WISP) in place for your business, then you could be risking data theft, legal action, and punitive fines. The law in many states now dictates … Continue reading Why every business needs a WISP

Towerwall Security/Vulnerability Alert Vol 13.96

4 Aug 2015

 The “Stagefright” hole in Android – what you need to know Provided by Paul Ducklin at Sophos, Inc. The conference circuit can be a competitive arena, especially when there are multiple parallel streams. For example, back in 2010, I was at Black Hat in Las Vegas, and I attended the talk next door to the late Barnaby Jack’s now legendary … Continue reading Towerwall Security/Vulnerability Alert Vol 13.96

Join Towerwall at the ISSA New England September Chapter Meeting

By Michelle Drolet . 29 Jul 2015

Join us at the the Fall meeting of the ISSA of New England on: Thursday, September 17, 2015 11:00 AM to 3:30 PM @Showcase Cinema de Lux at Patriot Place – Gillette Stadium, Route 1, Foxborough, MA Click here for more information on the ISSA, Speakers and Keynote topics Click here to Register   About ISSA … Continue reading Join Towerwall at the ISSA New England September Chapter Meeting

Page 8 of 23« First...45678910111213...20...Last »

Tags