ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Ransomware: Just Say No to Stronger Scare Tactics

Blog Published: 10/04/2016

By Susan Richardson, Manager/Content Strategy, Code42Ah, those ingenious cyber criminals. They keep coming up with ever more frightening ransomware threats. JIGSAW warns victims it will delete files every hour until they pay $150 USD in bitcoins. Chimera threatens to publish the victim’s files...

HIPAA Violations Examples and Cases – Eight Cautionary Tales

Blog Published: 10/06/2016

By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksThe Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare organizations and their business associates to protect sensitive data — including how the data is used and disclos...

Minister Denis Naughten to Address EU Security Directive at (ISC)2 Security Congress EMEA

Blog Published: 10/11/2016

Denis Naughten will address (ISC)2 Security Congress EMEA delegates on the latest developments in Ireland’s National Cyber Security Strategy since its launch in 2015, including the requirement to transpose the European Union Security of Network and Information Systems Directive (2016/1148) int...

Happy Birthday to… Wait, Who’s This Guy?

Blog Published: 10/11/2016

By Jacob Ansari, Manager, SchellmanHow many arbitrary people do you have to get into a room before two of them share the same birthday? Probability theory has considered this problem for so long that no one is quite certain who first posed the so-called “birthday problem” or “birthday paradox....

Five Prevention Tips and One Antidote for Ransomware

Blog Published: 10/25/2016

By Susan Richardson, Manager/Content Strategy, Code42During National Cyber Security Awareness Month, understanding the ins and outs of ransomware seems particularly important—given the scandalous growth of this malware. In this webinar on ransomware hosted by SC Magazine, guest speaker John Ki...

Everything You've Ever Posted Becomes Public from Tomorrow

Blog Published: 10/26/2016

By Avani Desai, Executive Vice President, Schellman & Co. As I sit here, ironically just wrapping up a privacy conference, scrolling my Facebook wall, I am seeing dozens of posts from smart, professional, aware people, all posting an apparent disclaimer to Facebook in an atte...

Defeating Insider Threats in the Cloud

Blog Published: 10/27/2016

By Evelyn de Souza, Data Privacy and Security Leader, Cisco Systems and Strategy Advisor, Cloud Security Alliance Everything we know about defeating the insider threat seems to not be solving the problem. In fact, evidence from the Deep, Dark and Open Web points to a greatly worsening probl...

To Include or Not to Include – Scoping ISO 27001 and Colocation Service Providers

Blog Published: 10/31/2016

By Ryan Mackie, Principal and ISO Certification Services Practice Director, SchellmanIntroductionISO 27001 North American GrowthISO/IEC 27001:2015 (ISO 27001) certification is becoming more of a conversation in most major businesses in the United States. To provide some depth, there was a 20% ...

The Dyn Outage and Mirai Botnet: Using Yesterday's Vulnerabilities to Attack Tomorrow's Devices Today

Blog Published: 11/02/2016

By Jacob Ansari, Manager, SchellmanOn Oct. 21, Dyn, a provider of domain name services (DNS), an essential function of the Internet that translates names like www.schellmanco.com to its numerical IP address, went offline after a significant distributed denial of service (DDoS) attack affected ...

Cyber Security Tip for CISOs: Beware of Security Fatigue

Blog Published: 11/04/2016

By Susan Richardson, Manager/Content Strategy, Code42What’s the most effective thing you can do for cyber security awareness? Stop talking about it, according to a new study that uncovered serious security fatigue among consumers. The National Institute of Standards and Technology study, publi...

Personalized Ransomware: Price Set by Your Ability to Pay

Blog Published: 11/11/2016

By Susan RichardsonSmart entrepreneurs have long employed differential pricing strategies to get more money from customers they think will pay a higher price. Cyber criminals have been doing the same thing on a small scale with ransomware: demanding a larger ransom from individuals or companie...

Fight Against Ransomware Takes to the Cloud

Blog Published: 11/14/2016

By Raj Samani, EMEA CTO, Intel Security“How many visitors do you expect to access the No More Ransom Portal?”This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going l...

Container Sprawl: The Next Great Security Challenge

Blog Published: 11/18/2016

By Jon King, Security Technologist and Principal Engineer, Intel SecurityAnd you thought virtualization was tough on security …Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show container...

Evolving Threats Compel an About-face in Data Protection Strategy

Blog Published: 11/21/2016

By Vijay Ramanathan, Vice President of Product Management, Code42It’s time to flip our thinking about enterprise information security. For a long time, the starting point of our tech stacks has been the network. We employ a whole series of solutions on servers and networks—from monitoring and...

Out of the Shadows

Blog Published: 11/23/2016

By Patty Hatter, Vice President and General Manager, Intel Security Group Professional ServicesHow to Bring Cloud Usage into the LightOn any given day – with a quick spot-check – you’ll probably find that up to half of your company’s IT usage is basically hidden in the shadows of various busin...

One Day Is a Lifetime in Container Years

Blog Published: 11/30/2016

By Jon King, Security Technologist and Principal Engineer, Intel Security Securing virtual assets that appear and disappear. The average life span of a container is short and getting shorter. While some organizations use containers as replacements for virtual machines, many are using them incr...

Insurance Carrot Beats Government Stick in Quest for Stronger Cybersecurity

Blog Published: 12/02/2016

By Laurie Kumerow, Consultant, Code42When it comes to cybersecurity, the U.S. federal government recognizes the carrot is more effective than the stick. Instead of using regulations to increase data security and protect personal information within private organizations, the White House is enli...

DevOpsSec, SecDevOps, DevSecOps: What's in a Name?

Blog Published: 12/05/2016

By Jamie Tischart, CTO Cloud/SaaS, Intel SecurityThe world is awash in DevOps, but what does that really mean? Although DevOps can mean several things to different individuals and organizations, ultimately it is about the cultural and technical changes that occur to deliver cloud services in a...

IBM Touts Major Mac Cost Savings; IT Professionals Still Hesitant

Blog Published: 12/09/2016

By Lance Logan, Manager/Global Marketing Program, Code42For the second year in a row, IBM’s Fletcher Previn wowed the audience at the JAMF user conference with impressive statistics on how the company’s growing Mac-based workforce is delivering dramatic and measurable business value.IBM expect...

Standardizing Cloud Security with CSA STAR Certification

Blog Published: 12/14/2016

By Tolga Erbay, Senior Manager, Security Risk and Compliance, DropboxIn early 2014 Dropbox joined the Cloud Security Alliance (CSA). Working with the CSA is an important part of Dropbox’s commitment to security and transparency.In June of 2014 Dropbox achieved Level 1 Certification through STA...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.