The Role of Human Error in Information Security

PECB

It has become an established fact that the human factor is the most important element to secure in any organization if security is to be maintained. This case study will take real-life examples (with no names used!) and examine some actual security incidents caused by human error and elaborate on the root cause and prevention tips resulting from these events.
Watch Now

Spotlight

"Cybercrime continues to make headlines but the nature of the attacks is changing. Within a few weeks of each other in early 2013, The New York Times, Apple, Twitter and other high-profile organizations openly admitted to significant data breaches. However, the nature of cyberattacks is changing. Threats have become more frequent and insidious, and the cloud and Big Data have added new risks.

This white paper discusses why the old data security model no longer works, the inherent risks of APTs and why perimeter defenses alone are not sufficient to safeguard organizations against the current generation of security threats."

OTHER ON-DEMAND WEBINARS

Register for the Nautilus cyber-security webinar

Nautilus

Cyber-security is an increasing challenge for the shipping industry and Nautilus is stepping in to help members by co-hosting a special training webinar for seafarers in September. With high profile ransomware attacks on shipping companies such as Maersk and COSCO, operators are under pressure to improve their cyber-security and to develop improved measures to protect their systems from attack. However, there is evidence that many companies are not doing enough to educate seafarers about the risks of cyber-attacks or how to avoid them. Research by Nautilus showed that 86% of crew had never received any cyber security training from their employers. The Union is teaming up with security experts Appsecco and their specialist maritime division ShipSecure, to hold a webinar to raise awareness of cyber security issues onboard.
Watch Now

Shaping the Financial Ecosystem with Secure APIs

Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer experience.We’ll discuss how and why finance
Watch Now

RSA 2018 - What’s Hot in the Cyber Security Space

Security Boulevard

Love it or hate, the annual RSA Conference (RSAC) in San Francisco is the largest cyber security conference in world. It is where the world comes to talk and learn security. Inevitably every year at RSAC there are some technologies that become the industry buzzwords and hot buttons. These generally stay on top of mind in the security industry for the rest of the year and beyond. In past years topics like cloud security, NAC, machine learning, threat analysis and more have launched entire ecosystems coming out of RSAC.
Watch Now

This is Security: Nothing is what it SIEMs

Alert Logic

Companies of every size and across every industry need to have the solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming. Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.
Watch Now

Spotlight

"Cybercrime continues to make headlines but the nature of the attacks is changing. Within a few weeks of each other in early 2013, The New York Times, Apple, Twitter and other high-profile organizations openly admitted to significant data breaches. However, the nature of cyberattacks is changing. Threats have become more frequent and insidious, and the cloud and Big Data have added new risks.

This white paper discusses why the old data security model no longer works, the inherent risks of APTs and why perimeter defenses alone are not sufficient to safeguard organizations against the current generation of security threats."

resources