How to Get Prepared for Privacy Legislation
Commentary | 11/27/2019 | All the various pieces of legislation, both in the US and worldwide, can feel overwhelming. But getting privacy basics right is a solid foundation.
On the Border Warns of Data Breach
Quick Hits | 11/26/2019 | Malware on a payment system could have stolen credit card info from customers in 28 states, according to the company.
DDoS: An Underestimated Threat
Commentary | 11/26/2019 | Distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers. Here's how to fight back.
TPM-Fail: What It Means & What to Do About It
Commentary | 11/19/2019 | Trusted Platform Modules are well-suited to a wide range of applications, but for the strongest security, architect them into "defense-in-depth" designs.
Human Nature vs. AI: A False Dichotomy?
Commentary | 11/18/2019 | How the helping hand of artificial intelligence allows security teams to remain human while protecting themselves from their own humanity being used against them.
BSIMM10 Shows Industry Vertical Maturity
Commentary | 11/14/2019 | The Building Security In Maturity Model is the only detailed measuring stick for software security initiatives, and it continues to evolve.
How Does Your Cyber Resilience Measure Up?
Commentary | 11/14/2019 | The security measures companies take today may not be enough for tomorrow's cyber assault, but switching to a proactive, risk-based framework may better protect your organization.
|