On 20th April 2015 a redesign of Continuity Central went live. On that site all content added to Continuity Central since 1st January 2015 is available.
To visit the new site click here.
You are welcome to continue browsing this archive, but please note that no new content is being added to it. For fresh content visit the new site.
|
The practice of employing a layered security model can and should be applied to BYOD says Scott Gordon.
Read article
•Type:
Article •Region: Worldwide •Level:
Advanced
Confusion exists as to what exactly an advanced persistent threat is and, even more importantly, how to manage the risks associated with APTs. Christos K. Dimitriadis provides some help.
Read article
•Type: Article •Region: World •Level: Basic
Changing threat profiles mean that information security systems need to adapt.
Read article
•Type: Article •Region: US/World •Level: Basic
•Type:
Article •Region: Worldwide •Level:
Basic
Security breaches are on the rise. Yet as security experts face ever more complex and challenging threats, is there a risk some of the basic components of IT security are being overlooked?
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Relying on standards and IT audits often leads to 'checklist syndrome', with the security strategy failing to address the wider business risks, even though the demands of the standard were met on paper, says Seth Berman.
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
The connected world is under siege and current security solutions and approaches are outdated and inadequate: it’s time for organizational boards to recognise this and take action.
Read article
•Type:
Article •Region: UK/Worldwide •Level:
Basic
Banning employee devices is not the answer to the BYOD information security challenge, says Grant Taylor.
Mark Kedgley examines the importance of real-time file integrity monitoring in a constantly and quickly evolving threat landscape.
Read article
•Type:
Article •Region: UK/Worldwide •Level:
Basic
•Type: Article •Region: UK/World •Level: Basic
At the recent RSA Conference 2013 in San Francisco, a clear consensus emerged: attacks on the trust established by cryptographic keys and certificates are on the rise and important element in today’s threat landscape.
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Why are spear phishing attacks increasing and what can organizations do to prevent falling victim?
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Information security programs that rely on defensive measures are no longer adequate.
Are reports of data loss and theft just the tip of an iceberg that at best compromises growth and at worst can result in the demise of businesses? Dr. Jim Kennedy gives his views.
Read article
•Type: Article •Region: US/Worldwide •Level: Basic
No business continuity plan is complete without taking into account the risk represented by DDoS attacks. Rakesh Shah explains the measures that can be taken to mitigate the threat.
Read article
•Type: Article •Region: US/Worldwide •Level: Basic
Many organizations are unaware of the information security risks associated withcopiers, fax machines and large volume printers. By Dr. Jim Kennedy.•Type: Article •Region: US/Worldwide •Level: Basic
Paul Kenyon examines the difference between proactive and reactive digital forensics and explains their contribution in the fight against malware and malicious activity.
Could you bring your company to its knees?
Getting breached doesn’t establish whether or not you have a decent security program in place: but how you respond to a security breach does.
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Threat emulation is a critical technique in achieving more effective network security. Terry Greer-King explains why.
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Extensible threat management is the next generation of unified threat management. This article provides an overview of XTM and explains its advantages over UTM..
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Cyber-crime is constantly evolving : to protect your company your methods and attitudes must evolve too.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Without classification as the foundation of the information protection strategy, it’s impossible for organizations to know what to protect, says Stephane Charbonneau.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Useful advice from Steve Salinas.
Read article
•Type: Article •Region: Worldwide •Level: Basic
How should banks and financial institutions deal with increasing numbers of large-scale denial of service attacks?
Read article
•Date: 23rd August 2013 • World •Level: Basic
•Type:
Article •Region: Worldwide •Level:
Basic
What can be done to prevent future cyber disasters? By Rob Rachwald and Noa Bar Yosef.
David Sandin looks at whether we have heeded the lessons of Heartbleed bug, the implications of Shellshock and the future security of open-source coding.
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Spamhaus attack shows how interdependent our networks have become.
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
Next-generation firewalls can be a real headache for the IT department; Sam Erdheim shows how to maximise security while avoiding the complexity that such firewalls can bring.
Read article
•Type:
Article •Region: UK/Worldwide •Level:
Basic
It is a sign of the changing security landscape that it is almost certain that sooner or later your organization will experience a security incident. It is therefore essential to have a cyber incident response plan in place.
Read article
•Type:
Article •Region: Worldwide •Level:
Basic
‘Envelope technology’ and the story about the ‘never changing password’: by Oded Valin.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Increasing challenges to corporate networks and data requires a new risk management approach.
Read article
•Type: Article •Region: UK •Level: Basic
The frequency and potential impacts of information security breaches are increasing. Dr. Jim Kennedy explains why and looks at what organizations can do about it.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Could CIR enhance information risk management?
Most companies are doing something to mitigate information risk, but few are doing enough says Christian Toon.
Read article
•Type: Article •Region: Worldwide •Level: Basic
There is a frequent bias in the industry towards focusing on the ‘cool’ exploit and detection side of cyber-defense, rather than the more operational response and mitigation side. This article by Proofpoint considers the other side of the equation, looking at incident response and outlining four steps to success in this area.
Read article
•Type: Article •Region: US/Worldwide •Level: Basic
Solutions to complex problems often require organizational changes: yet this critical element is often either ignored or seems impossible to implement.
Read article
•Type: Article •Region: Worldwide •Level: Basic
As the dust settles after the initial Heartbleed crisis response, what lessons are starting to emerge? By Russ Spitler.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Actionable information security practices are critical to business continuity planning, yet many business continuity plans do not include this element. This is a major oversight, says Rakesh Shah.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Ian Kilpatrick looks at the risks involved with mobile devices and how to secure them.
Read article
•Type: Article •Region: UK/Worldwide •Level: Basic
Information leakage can slip under the conventional information security safety net: Bernardo Patrão highlights the problem and discusses techniques that help reduce the risk of damaging information leakage impacts.
Barriers are not enough; data protection requires a systematic risk based approach.
Read article
•Type: Article •Region: UK •Level: Basic
Tom Davison looks at how failures can be used to boost security and help business continuity: if approached in the right way.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Advice from David Phillips.
Read article
•Type: Article •Region: Worldwide •Level: Basic
It’s a matter of due diligence says Dr. Jim Kennedy.
Read article
Read article
•Type: Article •Region: Worldwide •Level: Basic
LOM is a potent technology which has its uses; however it also poses some potential risks which every enterprise must be aware of.
Read article
•Type: Article •Region: Worldwide •Level: Basic
One of the major concerns is ‘name collision’ reports Jonathan French.
Read article
•Type: Article •Region: Worldwide •Level: Basic
GHOST could potentially allow an attacker to take over the control of an entire Linux system: Szilard Stange provides more details and lists actions that organizations can take to protect their systems.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Keith Bird shows how a new approach to mobile security can help organizations achieve the right balance of protection, mobility and productivity.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Smartphones raise key security issues, which many organizations have yet to address.
Read article
•Type: Article •Region: Worldwide •Level: Basic
There’s a new focus in town: data access control will increasingly trump network access control.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Enterprises need to move past the shock and begin formulating their own compromise recovery and business continuity plans.
Alexei Lesnykh highlights new threats and solutions.
Read article
•Type: Article •Region: Worldwide •Level: Basic
In a changing threat landscape anti-virus software is fast beginning to look past its sell-by date says Mark Kedgley.
Read article
•Type: Article •Region: Worldwide •Level: Basic
How smaller organizations can remain secure on limited budgets. By Chris Stoneff.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Defining Advanced Persistent Threats, by Amichai Shulman, CTO of Imperva.
Read article
•Type: Article •Region: Worldwide •Level: Basic
Businesses today are struggling with proper data protection: Rob Sobers provides some help.
Read article
•Type: Article •Region: Worldwide •Level: Basic
In many apparently very secure organizations, data leakage enabled by advanced evasion techniques is a potential disaster just waiting to happen. By Professor John Walker.
Read article
•Type: Article •Region: Worldwide •Level: Basic
A change is necessary in the mind-set about how we protect IT to an approach that sees attacks as a part of doing business.
Read article
•Type: Article •Region: Worldwide •Level: Advanced
|