This post is the next in our series focusing on building vs buying software for government uses. Also see our CTOvision Study on Build Vs Buy in Government and How Do Leaders In Government Decide GOTS or COTS? The issue of building or buying software for government uses is one of the oldest discussion topics in the federal IT ecosystem. Another interesting study that hits on … [Read more...] about Software Acquisition and Practices in Government: Build or Buy?
Specific numbers are hard to pin down on man-in-the-middle (MitM) attacks, but according to IBM's X-Force Threat Intelligence Index 2018, more than one-third of exploitation of inadvertent weaknesses involved MitM attacks. Exactly how do these hacks play out? How do criminals get in and steal information – and how are their techniques evolving? Here's a closer look at the … [Read more...] about Security 101: What Is a Man-in-the-Middle Attack?
Read you can protect your brand reputation with security intelligence on Recorded Future : Your company’s reputation is everything. But as you grow your online presence to connect with new audiences, enhance your customers’ experiences, and extend your services and offerings, your brand can become vulnerable to cybercriminals of all sorts: financially motivated attackers, … [Read more...] about Your Brand Is a Target: How to Protect Your Reputation With Security Intelligence
Read Taylor Armerding list four worst data breaches of 2019 on Security Boulevard : Corporations that don’t keep their data secure may soon long for the good old days when the “only” expenses they had to worry about from a data breach were recovery costs, brand damage, lawyers’ fees, and potential class-action lawsuits. Because soon the cost of noncompliance could dwarf … [Read more...] about Cost of data breaches in 2019: The 4 worst hits on the corporate wallet
Read why Lindsey O'Donnell says that insider threats are difficult to detect and mitigate on Threat Post : Insider threats are an ongoing top danger for companies — but when it comes to mitigation efforts, incident-response teams face an array of challenges. Discussions with various incident-response teams revealed that between 25 to 30 percent of data breaches involved an … [Read more...] about Insider Threats, a Cybercriminal Favorite, Not Easy to Mitigate
Read Susan Bradley's article about how to secure your DNS traffic under Windows on CSO Online : Domain Name System (DNS) is such a foundational function in Windows it is too often taken for granted. Think about ways to protect your firm’s DNS traffic both in terms of how attackers can impact your custom domain settings as well as protecting your workstations and providing more … [Read more...] about How to secure your DNS traffic under Windows