HackDig : Dig high-quality web security articles

«No Previous
No Next

The InfoSecond, Sept. 7–11: A World without Breaches, Deception and More!

2015-09-13 04:50

What better way to start the week than with a rundown on the biggest information security stories impacting your business and you? My thoughts exactly.

In this week’s entry, we’re exploring a world without breaches, taking notice of a rise in malicious email attacks, examining how security policies may create more harm than good, looking at deception as a defensive tactic for organizations, revisiting the Ashley Madison hack, and addressing the myth of one hour forensics in the latest episode of the InfoSecond!

In Case You Missed It

No Data Breach Detected: Did you hear about that catastrophic data breach that didn’t happen last night? Even though it seems like fantasy with all the major breaches dominating the news today, it’s possible with the right security solutions. Watch our all-new ad (which you might’ve seen during The U.S. Open) and see how IBM Security can keep your organization out of the headlines.

Malicious Email Attachments: Don’t call it a comeback; they’ve been here for years. Literally. Malicious email attachments are on the rise again, thanks in part to new spearfishing tactics that are targeting more easily and believably.

Is Your Security Policy Creating Problems? Security policies aren’t the end all, be all for organizations. Without compliance and enforcement, they provide nothing more than a false sense of security. Here’s how organizations can develop security policies with the controls necessary to keep them ahead of the pack.

Deception Tools for Defense: Cybercriminals often use deception to target individuals and organizations during a cyberattack. Can the same thing be done to flip the script? According to a new report from Gartner on the topic, yes, it most certainly can, and 10% of organizations are expected to deploy technologies like this by 2018.

Ashley Madison Lawsuits: The Ashley Madison hack is staying in the news this week as the first 3 individuals have filed suit against GoDaddy and Amazon for hosting the stolen data, as well as the websites that are making it accessible. Expect much more on this story as it continues to develop.

The One Hour Forensics Myth: Unlike what we see on the television, there’s no one hour story arc behind cyberattacks. In reality, the process of detection, escalation, containment, recovery, and post-mortem can last for days, weeks, or even more!

See You Next Week

Thanks for stopping by for another edition of The InfoSecond. If there are any stories that you think should be featured in this series, remember to share them with us using the hashtag #InfoSecond. See you here same time next week!

The post The InfoSecond, Sept. 7–11: A World without Breaches, Deception and More! appeared first on Security Intelligence.

Source: /8xRuOjpb8tK/3~/ecnegilletnIytiruceS/r~/moc.elgoog.yxorpdeef

“The InfoSecond, Sept. 7–11: A World without Breaches, Deception and More!”0 Comments

Submit A Comment



Blog :

Verification Code:


Share high-quality web security related articles with you:)
Tell me why you support me <3