Contact Us +1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Security’ Category

It Matters: The EU Gets It Right with its Network and Information Security (NIS) Directive

Friday, August 12th, 2016

Cyber security is one of the most pressing issues of our time, many consider it to be as big a threat to society as terrorism. When you take into account that a breach within critical sectors—  ranging from Energy– suppliers, operators, distributors, transmitters of oil and gas; to Transportation- airlines, airport managing bodies, rail transport […]

Could Pokémon Go be the largest surveillance app yet?

Tuesday, August 2nd, 2016

Access to location information, your camera, your photo’s and your email all in one simple app download. Computer Gaming has always been a way to lure people to downloading a so called free app which comes bundled with malware either to use your computer for malicious activity or to steal your data for cyber crime […]

The EU General Data Protection Regulation is finalized. What’s it all about?

Wednesday, May 4th, 2016

The new EU General Data Protection Regulation is something that has been going on for several years. It will replace what was previously the European General Data Protection directive from 1995. The idea was to build a consistent foundation across all European Union States so there’s a basic commonality or consistency between what happens with data […]

Breaking Bad Behavior

Tuesday, December 1st, 2015

Behavioral Analysis is becoming a huge buzzword in the IT and Information Security industries. With the idea that you can automatically determine whether or not what’s going on within your network is legitimate or not is a huge benefit to any organization. But, challenges exist. The sheer volume of data available makes finding attention-worthy events […]

10 Must-Follow InfoSec Bloggers of 2015

Thursday, November 12th, 2015

Want to stay up to date on the latest information security trends, breaches, and discoveries? We searched across the deep web to find the top bloggers who live and breathe information security. It’s these amazing security experts who make your life easier by keeping you up to date on the latest InfoSec news and research. […]

Why you are being targeted by cyber criminals & 7 things you can do about it

Thursday, October 22nd, 2015

Imagine this. You’re a high ranking government officer on your way to classified meeting discussing extremely sensitive details for an operation you’re overseeing. Suddenly, you get an email in your personal account from a friendly colleague who is asking for the list of people that are attending a meeting next week. Without a second thought, […]

PRIVILEGED USERS AND DATA BREACHES: A MATCH MADE IN HEAVEN?

Tuesday, December 2nd, 2014

With data breaches on the rise, more evidence is constantly being discovered to support the link between privileged accounts in organizations and network breaches. Thycotic and IANS recently conducted a survey of 100 experienced security and IT operations professionals regarding their recent data breaches and privileged account misuse, and the results show there is indeed […]

Access Control: Models and Methods

Tuesday, November 4th, 2014

By: Stuart Gentry, an InfoSec Institute contributor and computer security enthusiast/researcher. There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of access to read and/or modify the item. This can happen at the most inconvenient time and they would need […]

Predicting Potential Threat: Behavior Analytics & Threat Modeling

Tuesday, October 21st, 2014

Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major […]

POODLE: Not your typical walk in the park

Wednesday, October 15th, 2014

Google, among several security organizations, recently announced a vulnerability in the SSL protocol, particularly SSL version 3. SSL is used to secure connections between a client and server to prevent eavesdropping, and that the data has not been tampered. SSLv3 is an old version of the SSL protocol, dating back to 1996 and debuted with Netscape […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days