Insider Risk Hits Closer to Home

If you’re busy securing the perimeter, mandating strong authentication practices, and restricting software downloads, you may be missing the mark. (Just to be clear: if you are doing those things, keep it up. You’re off to a good start, and…

#InfosecurityEurope: Financial Firms to Build Resilience in Face of Growing Cyber-Threats

The Bank of England’s Prudential Regulation Authority is at the center of the UK’s push to improve operational resilience This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #InfosecurityEurope: Financial Firms to Build Resilience in Face of Growing…

Network security policy

This policy from TechRepublic Premium will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: The IT…

#InfosecurityEurope: Why API Security Could Be the Next Big Thing in Cyber

APIs have become fundamental to everyone’s digital life, yet API security continues to be overlooked, Contxt’s CEO Mayur Upadhyaya said during Infosecurity Europe This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #InfosecurityEurope: Why API Security Could Be…