Monday, September 28, 2015
Understanding Espionage Tradecraft
Only by understanding the threats and the basics of the tradecraft utilized to facilitate industrial espionage can an organization develop an effective counterespionage program. This chapter from Industrial Espionage: Developing a Counterespionage Program by Daniel J . Benny reviews espionage tradecraft including the intelligence cycle, the categories of intelligence collection, and the methods of collection.
Wednesday, September 23, 2015
Travel Security: What to Know Before You Head to High-Risk Locales
Here's an interesting, timely, and short piece from IBM on travel safety.
I don't know if you've ever read Stratfor's guidance on personal security, such as "Taming Chaos with a Personal Plan," but this new book, Personal Security: A Guide for International Travelers, provides a comprehensive approach to personal security and safety when travelling, or even while at home. To support your pre-trip preparations, this chapter, "Before You Go," maps out expert advice and lessons from real life cases to give you insights into basic planning questions.
So, if you company doesn't have a Travel Security Team, or even if it does, get an little extra insurance with your personal copy of Personal Security: A Guide for International Travelers.
Monday, September 21, 2015
The 7 Deadly Sins of Incident Response
The 7 Deadly Sins of Incident Response
In today's cyber-society, where we are witnessing an endless barrage of attacks on government and enterprise networks, it is clear that organizations need to be more proactive when it comes to security and protecting themselves. Despite this, more companies are still committing the "7 deadly sins" when it comes to incident response. Taking this into consideration, this article highlights why it is important for companies to have a built in incident response function; lists the top 7 mistakes companies are making when attempting to build an incident response function; and provides tips for how to deploy an effective incident response function and keep your organization safe from attackers.
Thursday, September 10, 2015
Top 3 Factors Driving the Rise in Data Breaches
It comes as no surprise that the number of companies falling victim to data breaches is on the rise. These stories are making headlines, and making CEOs and employees alike nervous that they will be the next victim. As computers are getting faster, so are hacking attempts. Hackers are now more capable than ever to implement their plans. This article outlines the top three factors that are contributing to the rise of data breaches.
Friday, September 4, 2015
The Privacy Professor's September Tips: Don't Let the Bloom Fade from Privacy Diligence
The Privacy Professor's September Tips: Don't Let the Bloom Fade from Privacy Diligence
The latest tips from Rebecca Herold, The Privacy Professor.
Her latest book is Data Privacy for the Smart Grid, co-written with Christine Hertzog.
The latest tips from Rebecca Herold, The Privacy Professor.
Her latest book is Data Privacy for the Smart Grid, co-written with Christine Hertzog.
Thursday, September 3, 2015
McAfee Labs Threats Report: August 2015
In this report, a dozen thought leaders from Intel Security share their views on the changes they have witnessed in the cyberthreat landscape and the evolution of security technology over the past five years. The report also compares what really happened to what we thought would happen over the past five years—from new approaches to cyberattacks to the economics of cybercrime; details techniques cyberthieves use to exfiltrate valuable data, moving it from your network to theirs; and separates fact from fiction about potential malware attacks on graphics processing units (GPUs).
Subscribe to:
Posts (Atom)