FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayInfoSec Resources

Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy

By Susan Morrow

IntroductionΒ  I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, looking for ways to maximize profit while seeking innovative methods to circumvent our efforts to protect our businesses. The figures speak for themselves. […]

The post Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy appeared first on Infosec Resources.


Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy was first posted on October 22, 2020 at 8:01 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

2020 Verizon Data Breach Investigations Report: Summary and key findings for security professionals

By Greg Belding

Introduction The Verizon Data Breach Investigations Report, or the Verizon Data Breach Report, is an annual report intended for information security professionals. It summarizes 3,950 confirmed data breaches and is a collection of work from 81 contributors spanning 81 countries and has grown more than a little bit since last year’s twelfth edition.Β  Navigating this […]

The post 2020 Verizon Data Breach Investigations Report: Summary and key findings for security professionals appeared first on Infosec Resources.


2020 Verizon Data Breach Investigations Report: Summary and key findings for security professionals was first posted on October 21, 2020 at 8:01 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

Cost of non-compliance: 8 largest data breach fines and penalties

By Greg Belding

Introduction Different regulations and laws will slap organizations with fines and penalties for data breaches. This is because the organization did not take the privacy of their data seriously. However, the authorities take this responsibility very seriously and will not hesitate to punish with fines and penalties that are sometimes in the hundreds of millions […]

The post Cost of non-compliance: 8 largest data breach fines and penalties appeared first on Infosec Resources.


Cost of non-compliance: 8 largest data breach fines and penalties was first posted on October 20, 2020 at 8:03 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

Implementing a zero-trust model: The key to securing microservices

By David Bisson

Introduction Organizations are increasingly integrating microservices into their software development processes. As noted by DZone, microservices break down software into multiple component services, thereby enabling organizations to deploy parts of an application without compromising the integrity of the entire program.Β  This property also allows developers to address a microservice that starts acting up. The other […]

The post Implementing a zero-trust model: The key to securing microservices appeared first on Infosec Resources.


Implementing a zero-trust model: The key to securing microservices was first posted on October 20, 2020 at 8:00 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

Japan’s IoT scanning project looks for vulnerable IoT devices

By Rodika Tollefson

The growing world of IoT β€” and security concerns The Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and continues to expand at a healthy pace. Telecommunications giant Ericsson estimates the number of IoT connections to grow from 10.8 billion in 2019 to 24.9 […]

The post Japan’s IoT scanning project looks for vulnerable IoT devices appeared first on Infosec Resources.


Japan’s IoT scanning project looks for vulnerable IoT devices was first posted on October 15, 2020 at 8:03 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

How to create a subdomain enumeration toolkit

By Pedro Tavares

Introduction A domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain can be classified. Within this context, two scenarios of how to take advantage of domain misconfigurations will be analyzed. Finally, we’ll discuss building […]

The post How to create a subdomain enumeration toolkit appeared first on Infosec Resources.


How to create a subdomain enumeration toolkit was first posted on October 14, 2020 at 8:04 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
❌