This infographic from Mike's Gear Reviews displays the anatomy of an unbreakable password and gives you six methods to create a secure password you'll actually remember.
http://informationsecuritytoday.blogspot.com/2018/04/6-methods-to-create-secure-password.html
Stronger authentication is possible with 802.1X although several challenges currently exist for IEEE 802.1X NAC and authentication. For the most part, the challenges relate to the need for costl...
http://informationsecuritytoday.blogspot.com/2018/02/8021x-authentication-has-never-been-so.html
From Science Fiction to Reality: U.S. Navy Technology and Innovation By David Smalley, Office of Naval Research From the 1930s on, science fiction comics, books and movies had plenty of futur...
http://informationsecuritytoday.blogspot.com/2018/01/from-science-fiction-to-reality-us-navy.html
This excerpt from FinTech: The Technology Driving Disruption in the Financial Services Industry by Parag Y. Arjunwadkar explains the basic of blockchain and then reviews how Fintechs are adopti...
http://informationsecuritytoday.blogspot.com/2017/12/introduction-to-blockchain-and-its.html
Paul Myer, CEO, Veracity Industrial Networks makes these predictions about the industrial IoT for 2018: THERE WILL BE A NATION-STATE CYBER-ATTACK ON OUR CRITICAL INFRASTRUCTURE IN 2018 There...
http://informationsecuritytoday.blogspot.com/2017/12/2018-industrial-iot-predictions.html
The Convergence of Data Management Technologies, Growth of Metadata Management and the Increased Focus on AI Make Up the Most Impactful Trends for 2018 > NAPERVILLE, Ill. (PRWEB) November 14...
http://informationsecuritytoday.blogspot.com/2017/12/the-top-game-changing-data-trends-for.html
The last US presidential election revealed the dangers and the difficulties of prognostication. But that doesn't deter those determined to look ahead at what we may face in 2018. We reached out t...
http://informationsecuritytoday.blogspot.com/2017/12/2018-security-predictions-its-still.html
On December 7, 2017, at 10 AM EST, James Bone, author of Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind, is conducting a webinar on "Is Cognitive Computing the Next Ste...
http://informationsecuritytoday.blogspot.com/2017/11/webinar-is-cognitive-computing-next.html
2017 has officially become the worst year on record with over 16,006 disclosed vulnerabilities. RICHMOND, VA, NOVEMBER 14, 2017 -- Risk Based Security today announced the release of its Q3 201...
http://informationsecuritytoday.blogspot.com/2017/11/no-shock-worst-year-for-vulnerabilities.html
Nozomi Networks has comprised the top 5 predictions for ICS Security in 2018. 1. ICS malware moves beyond Windows exploits to ICS-specific malware. Up to now, most malware that has infected IC...
http://informationsecuritytoday.blogspot.com/2017/11/top-5-predictions-for-ics-security-in.html
From Eskenzi PR: "Nozomi Networks has taken a look into the BadRabbit Ransomware that hit Russia and Ukraine yesterday affecting systems at three Russian websites, transport systems in Ukr...
http://informationsecuritytoday.blogspot.com/2017/10/research-on-badrabbit-ransomware.html
Reuter's reports that the EU-U.S. data transfer pact passes its first annual review. EU data privacy protection rules are getting tougher all the time and they're not shy about imposing fines ...
http://informationsecuritytoday.blogspot.com/2017/10/eu-us-data-transfer-pact-passes-first.html
According to the New York Times, "What gave the Russian hacking, detected more than two years ago, such global reach was its improvised search tool -- antivirus software made by a Russian company...
http://informationsecuritytoday.blogspot.com/2017/10/how-israel-caught-russian-hackers.html
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It provides insight as to why and how current security management practices fail at their basic foundation, resulting in o...
http://informationsecuritytoday.blogspot.com/2017/09/why-cisos-fail-missing-link-in-security.html
Big data analytics provide more accurate, timely, and actionable decisions for both cybersecurity and IT management. Big Data Analytics in Cybersecurity gives you a comprehensive coverage of sta...
http://informationsecuritytoday.blogspot.com/2017/09/new-release-big-data-analytics-in.html
Despite prioritizing privileged access management, a majority of enterprises fail to prevent the abuse or misuse of privileged credentials PHOENIX, September 20, 2017 -- BeyondTrust today announ...
http://informationsecuritytoday.blogspot.com/2017/09/survey-reveals-5-deadly-sins-that.html
According to this article in Website Magazine, "Compliance officers need to rein in the regulatory risks associated with their digital properties. The European Union's General Data Protection ...
http://informationsecuritytoday.blogspot.com/2017/09/gdpr-pandoras-box-is-open-for.html
WHAT BUSINESSES NEED TO KNOW IN THE WAKE OF THE EQUIFAX BREACH By Jason Tan, CEO of Sift Science Online businesses everywhere are going to be dealing with the effects of the recent Equifax...
http://informationsecuritytoday.blogspot.com/2017/09/what-businesses-need-to-know-in-wake-of.html
Read this chapter from Why CISOs Fail: The Missing Link in Security Management--and How to Fix It and understand why the author likes to call information security the "dismal discipline," and wh...
http://informationsecuritytoday.blogspot.com/2017/09/information-security-dismal-discipline.html
The latest Global Information Security Workforce Study paints a grim picture, predicting that in five years, the number of unfilled cybersecurity jobs will raise to 1.8 million worldwide. The ma...
http://informationsecuritytoday.blogspot.com/2017/08/universities-still-struggle-to-provide.html
Shelly Palmer notes that "Proponents of the technology tout its convenience and the idea that you never have to remember your wallet or a password, ever again. While they are technically correct,...
http://informationsecuritytoday.blogspot.com/2017/08/chipping-people-are-you-ready.html
New findings from Imperva Incapsula researchers published today Attackers Use DDoS Pulses to Pin Down Multiple Targets details the emergence of a new assault pattern, which they’ve named Puls...
http://informationsecuritytoday.blogspot.com/2017/08/new-research-on-pulse-wave-ddos-attacks.html
Smart Energy: From Fire Making to the Post-Carbon World first traces the history of mankind's discovery and use of energy. It then reviews contemporary issues such as global warming, environment...
http://informationsecuritytoday.blogspot.com/2017/06/how-long-can-resources-in-short-supply.html
Understanding the Organizational Context for a Business Impact Analysis Conducting a business impact analysis (BIA) for an organization makes it imperative for a practitioner to understand the ...
http://informationsecuritytoday.blogspot.com/2017/06/understanding-organizational-context.html
This article discusses the role of the CISO, how it has changed over the years, and what tools and skills a CISO needs. BTW, we have a slew of books on the roles of the CISO. You can find them...
http://informationsecuritytoday.blogspot.com/2017/06/what-is-role-of-ciso.html