People Are Not IP Addresses…So Why Do Security Solutions Think They Are?

People Are Not IP Addresses…So Why Do Security Solutions Think They Are?

Attackers are erasing database contents and replacing them with a note demanding Bitcoin ransom payment for restoration. It also appears that victims who pay are often not getting their data back, and that multiple attackers are overwriting each other’s ransom demands. Seriously, these databases are of course important to their owners, and these attacks are [...]

(ISC)² Board of Directors Elect 2017 Officers

(ISC)² Board of Directors Elect 2017 Officers

(ISC)² Board of Directors Elect 2017 Officers International team of security professionals elected to lead governing body; Wim Remes elected chair for third time in four years Clearwater, FL, January 18, 2017 — (ISC)²® today announced the newly elected officers for its board of directors. The 13-member board provides governance and oversight for the organization, [...]

Work Hard, Have Fun and Learn with New CISA Online Review Course

Work Hard, Have Fun and Learn with New CISA Online Review Course

At the very end of his 2010 speech at the iPad's debut, Steve Jobs mused on the secret to Apple's success: “It’s in Apple’s DNA that technology alone is not enough. It’s technology married with liberal arts, married with the humanities, that yields the results that make our hearts sing.”1 Now I’m not foolish enough [...]

5 Key Considerations When Implementing User-Based Access Controls

5 Key Considerations When Implementing User-Based Access Controls

End users, the very community of individuals chartered to preserve the integrity of your business, embody a profound vulnerability point within your network’s security infrastructure. By the year 2020, IDC expects mobile workers, in the United States alone, will account for nearly three quarters of the total workforce*. As a result, IP addresses are no [...]