01 Jun Feats of Strength – June 2017: A Business Focused Information Security Magazine
View or Download full publication here...
View or Download full publication here...
It is no secret that vendor management is one of the top security challenges we face today. But what compounds the challenge is not knowing the relationships beyond our direct vendors. What are the vendors of my vendor doing? I don’t know what I don’t know The...
THE TRADITIONAL MODEL of hacking a bank isn't so different from the old-fashioned method of robbing one. Thieves get in, get the goods, and get out. But one enterprising group of hackers targeting a Brazilian bank seems to have taken a more comprehensive and devious...
View or Download full report here...
You know how teachers used to say, “You can’t cheat your way through life, so don’t cheat on this test.” They may have been right about the test...
Women make up roughly half the world's population, they hold around 50 percent of jobs in the U.S. workforce and fill 25 percent of IT jobs, yet they account for only 10 percent of the positions in cybersecurity. Females in the field are uniting to help...
Accessibility must come with data and privacy protection. In credit union branches and with digital offerings, tension often exists between making services available and convenient and preventing potential breaches of members’ personal information. For example, Sikorsky Financial Credit Union in Stratford, Conn., works with a third-party vendor...