Stream

Join this community to post or comment

Ron Krebs

General discussion  - 
 
"ISO 27002 IT Security Standard:"
http://www.praxiom.com/iso-27002.htm
3
Add a comment...

Joe Pettit

General discussion  - 
 
Good written communication skills, such as those used in research papers, are valuable and can help you succeed in school and in the security field.
1
Add a comment...

Dashlane

Threats and malware  - 
 

We'll all tech-savvy and security minded, but do you know a friend, family member, or coworker, that could use a password manager but is still hesitant or too skeptical to download one? Send them this blog post with 9 reasons why they shouldn't wait to download a password manager (reason 8 may surprise them)! Find it here: https://blog.dashlane.com/9-reasons-to-download-a-password-manager/ 
It's only a matter of time before your data gets into the wrong hands. Here are 9 reasons why you should you shouldn't wait to download a password manager.
2
Add a comment...

Joe Pettit

General discussion  - 
 
It’s 2017, which means we’re less than a year and a half out from the EU General Data Protection Regulation (GDPR) taking full effect. The European Commission has a lot to do in the meantime. One of its most pressing objectives is to adapt the current rules, which are enshrined in European Union’s ePrivacy Directive, to the GDPR and thereby help protect users’ confidentiality and privacy.

+David Bisson
One of the European Commission's most pressing objectives is to adapt the current rules to the GDPR and help protect users' confidentiality and privacy.
1
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cyber Security News of the Week, January 8, 2017
CYBERSECURITY NEWS FROM
OUR FRIENDS AT   CITADEL INFORMATION GROUP Individuals at Risk Cyber Privacy People Are Praising
Pope Francis for Taking Cybersecurity Very Seriously: He has 10.2
million followers on Twitter, opened an Instagram account last year, h...
2
Add a comment...

Nicole Byer

Mobile security  - 
 
2016 was a disastrous year for corporate and governments in terms of hacking incidents and attempts. There was a...
2
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cyber Security News of the Week, January 1, 2017
CYBERSECURITY NEWS FROM
OUR FRIENDS AT   CITADEL INFORMATION GROUP Individuals at Risk Cyber Privacy Airline passenger details
easy prey for hackers, say researchers: The worldwide system used to
coordinate travel bookings between airlines, travel agents, a...
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cyber Security News of the Week, December 25, 2016
CYBERSECURITY NEWS FROM
OUR FRIENDS AT   CITADEL INFORMATION GROUP Individuals at Risk Identity Theft What the technical
words in breach disclosure letters mean: When companies tell you
your data was stolen, it’s not always clear what really happened. Here’...
1
Add a comment...

Joe Pettit

General discussion  - 
 
Being a cybersecurity leader these days is… well, complicated. From standards, frameworks and policies to platforms, products and vendors, the cybersecurity roles within an enterprise, including the CISOs who oversee them, are faced with more complexity than ever, even as the visibility and pressures on them have increased.

+Tripwire, Inc.
As noted in a recent white paper on the Six Essential Tasks for State Government CISOs, the first imperative for security leaders is to manage complexity.
7
1
Add a comment...

Joe Pettit

Threats and malware  - 
 
In January 2017, note-taking app Evernote is set to introduce a new privacy policy that introduces machine learning features. The privacy policy has got many users hot under the collar, fearful that some Evernote employees will be able to read their notes.

+Graham Cluley
If you're upset that Evernote's proposed new privacy policy will mean staff can read your notes, you haven't read the existing privacy policy carefully
1
Add a comment...

Created by

About this community

The BrightTALK IT security community will cover breaking news in the industry and relevant topics like risk management, BYOD, malware and developing threats as well as mobile and application security. BrightTALK also tweets about IT security news and events from @InfoSecWebinars. Please post only relevant articles or resources!
San Francisco, NYC, London

Joe Pettit

General discussion  - 
 
Implicit deny and explicit allow were two core fundamentals from the start of the information security discipline. However, as the scale and complexity of infrastructures grew, it became evident the list of things we should allow is exponentially smaller than the list of things we should deny. Say “no” to everything unless it is known to be good.

+Ean Meyer on +Tripwire, Inc.
Though information security has evolved, how we communicate with teams has not. It is now clear we need to whitelist our relationships with people.
1
Add a comment...

Nicole Byer

Mobile security  - 
 
If you are amongst the majority who love to shop online, then you are also among those who do not...
4
3
Add a comment...

Joe Pettit

General discussion  - 
 
Most organizations are overwhelmed, understaffed, and/or underfunded when it comes to cybersecurity. These constraints create a critical need to prioritize on the most critical cybersecurity measures.

+Tripwire, Inc.
Most organizations are overwhelmed, understaffed, and/or underfunded when it comes to cybersecurity, creating a need to prioritize cybersecurity measures.
2
Add a comment...

Nicole Byer

Mobile security  - 
 
What will be our next security challenge in the coming decades? Without the shadow of any doubt, it will be the...
1
2
Add a comment...

Darshik Jariwala

General discussion  - 
 
What is Vulnerability Assessment?

Vulnerability Assessment is also sometimes referred to as Vulnerability Analysis. Vulnerability Assessment is the process of conducting security assessments to identify the loopholes
https://goo.gl/in2Hcn
Vulnerability Assessment is the process of conducting security assessments to identify the loopholes in the system which can be exploited by an outsider
1
Add a comment...
 
 
If you are interested in ethical hacking, here's a free course that you can take : https://goo.gl/AWWGnO
81,000 plus students enrolled in this course, overall rating 4.4 out of 5. Valid for a short time only, go get it guys!
8
Robert Joe's profile photo
 
Thank you mate!

Add a comment...

Adnan Momin

General discussion  - 
 
 
Why Open-Source? Power Of Open-Source:
Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open source developers choose to make the source code of their software publicly available for the good of the community and  to publish their software with an open source license – meaning that other developers can see how it works and add to it. It is software developed by and for the user community.
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Improved Soft Skills Can Elevate Your Career

Soft Skills, People Skills, Emotional Intelligence
2
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cyber Security News of the Week, December 18, 2016
CYBERSECURITY NEWS FROM
OUR FRIENDS AT   CITADEL INFORMATION GROUP Individuals at Risk Identity Theft Yahoo says 1
billion user accounts were hacked: Yahoo said Wednesday that more
than 1 billion user accounts — meaning most of the Internet giant’s customer...
1
Add a comment...

Joe Pettit

Threats and malware  - 
 
IT professionals are instrumental to strengthening an organization’s digital security. They must fulfill a variety of duties to work towards that end. One of their most important responsibilities is helping their company detect and respond to data breaches.
Most information security personnel in the healthcare sector are overconfident in their organization's breach prevention and response capabilities.
2
2
Add a comment...