Sweet Security Nuggets in Android Nougat
Google has released the long-awaited 7.0 version of Android, known as Nougat, and along with the usual performance and feature improvements, this release also is chock full of security improvements, both for users and developers. Many of the new security features are underneath the surface and won’t be visible to most users, but the changes are significant and should have a major effect on user safety.
Building Your Incident Response Team: Key Roles and Responsibilities
Part 3 of our Field Guide to Incident Response series covers a critical component of IR planning: assembling your internal IR team.
Podcast: Lessons from Fortune 100 Incident Response
Tim Bandos and Paul Roberts discuss the current state of incident response at organizations along with tips for more effective IR learned from Tim’s tenure at a Fortune 100 manufacturer.
The Do’s and Don’ts of Incident Response
Time is of the essence when responding to a security incident – Part 2 of our Field Guide to Incident Response series offers five don’ts and four do’s for effective incident response. The video clip below explains the do's and don'ts of incident response and is taken from our webinar, Incident Responder's Field Guide - Lessons from a Fortune 100 Incident Responder. You can watch the full webinar here.
What is Cloud Security Monitoring?
Learn more about cloud security monitoring solutions in Data Protection 101, our series on the fundamentals of data security.
Two Frameworks for DLP Success
Our Definitive Guide to DLP series concludes with two frameworks for meeting your long-term DLP goals.
Carded: Hack of Medical ID Card Provider Affects 3.3M
The hack of Newkirk Products, a little known provider of medical ID cards, underscores the dangers third parties pose to regulated health data.
Facebook, Ad Blockers and the End of the Open Web
The web was designed as an open platform, a way for people and machines to communicate with each other regardless of borders or other barriers. The network’s architects meant for it to remain that way, but over time it has gradually become more segmented, by nations as well as corporations, and that’s to the detriment of users everywhere.
5 Key Criteria for Creating an Incident Response Plan that is Practical for YOUR Organization
As more organizations fall victim to cyber attacks, a renewed focus is being put on incident response. Here are five key considerations for creating an effective incident response plan in Part 1 of our new series, The Incident Responder’s Field Guide.
What are Managed Security Services (MSSPs)?
More organizations are turning to managed security services to gain security expertise and lessen the workload of their in-house security staff. Learn more about this option in Data Protection 101, our series on the fundamentals of information security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.