INFOSECURITY NEWSLETTER

July 19, 2017

7 Deadly Sins to Avoid When Mitigating Cyber Threats

Mark Wilczek, darkreading.com, July 14, 2017

Organizations these days are in full swing “going digital,” with bold visions of a bright and shiny future. But too often in their quest for the holy grail of capturing market share, management tends to focus solely upon the digital opportunities without adequately addressing the parallel issue of improving cybersecurity to combat current and emerging threats.

Read More

4 Ways to Integrate Your Cyber Security Incident Response and Business Continuity Plans

Stephanie Ewing-Ottmers, deltarisk.com, July 12, 2017

In most organizations, cyber security incident response (IR) and business continuity (BC) or disaster recovery (DR) are still considered as separate functions and distinct disciplines. This is clearly a missed opportunity to maximize resources since they are two sides of the same coin.

Read More

Gone Phishing: The Top 10 Attractive Lures

Roy Urrico, cutimes.com, July 13, 2017

What are the most attractive phishing lures? Security alerts, vacation and sick time policy announcements, and package delivery notifications, according to simulated test findings from Tampa Bay, Fla. cybersecurity firm KnowBe4.

Read More

The 3 Most In-Demand Cybersecurity Jobs of 2017

Alison DeNisco, techrepublic.com, July 17, 2017

Cybersecurity roles rank among the most difficult to fill in the enterprise, with the talent gap in this field expected to reach 1.8 million jobs by 2022. This is a major problem, as threats such as ransomware are at an all-time high.

Read More

The Need for SPEED: How to Improve Your Cyber Security Incident Response Times

Devesh Panchwagh, deltarisk.com, July 17, 2017

Today’s blog is written by our guest author, Bob Carver. He is a CISM, CISSP, and M.S. who specializes in topics about information security, privacy, and cloud security. If you look at a range of recent security industry reports, you’ll see varying times quoted for how long it takes criminals and bad actors to exploit your network and exfiltrate data, and how long it takes to discover and remediate a breach.

Read More

Beware of These Top 10 Phishing Emails. Would You Fall for Them?

Robert Hackett, fortune.com, July 13, 2017

One hazard of being a cybersecurity reporter is that attackers send phishing emails to my inbox on a daily basis. If you don’t believe me, ask the security team at Time Inc., Fortune’s parent company.

Read More

Six Entry-Level Cybersecurity Job Seeker Failings

George V. Hulme, csoonline.com, July 17, 2017

When it comes to hiring, enterprise security teams can use all of the help that they can rally. When hiring entry-level talent, that’s not as easy as it may seem — many times because entry-level applicants don’t do everything they could to help their cause.

Read More

NIST Pulling Together Best Practices for Boosting Federal Cyber Workforce

Rachael Kalinyek, fifthdomain.com, July 12, 2017

President Trump issued an executive order May 11 to strengthen cybersecurity and other related fields that are a foundation for achieving objectives in the cyber domain. According to the executive order, the United States’ policy is to support the growth and sustainment of a skilled cybersecurity workforce.

Read More

(Opinion) Why Automation Isn’t Everything in Cybersecurity

Kumar Saurabh, csoonline.com, July 14, 2017

With the latest advancements in automation and AI, many CISOs are recognizing the potential for automation to transform security operations. Given the way many technology vendors hype their solutions, you could be forgiven for thinking humans should be removed from security flows to the greatest extent possible.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points