Another year has passed and along with it another set of massive data breaches to look back upon. In a digital age when we are providing more and more personal data to businesses and conducting most of our financial transactions online, we would expect companies to keep up with the threat
Whether we’re educating technology professionals on the latest trends in cybersecurity or translating industry jargon into plain English for executives and other non-technical audiences, the SLPowers Speakers Series represents a “Sales Free Zone.” Our mission is to advance the
Security information and event management (SIEM) software gives security professionals both insight into and a track record of the activities within their IT environment. It’s a group of complex technologies that together, provide a centralized bird’s-eye-view into a network’s infrastructure.
The holiday season is upon us and the biggest online shopping sales are right around the corner. Analysts are predicting ecommerce holiday sales will reach 107.4 billion, which is a 13.8% increase from the same period last year. Cyber Monday is set to remain the overall leader in shopping days,
A new industry study that reveals more than half of security professionals surveyed say insider threat incidents have become more frequent in the past 12 months. Of the 508 security professionals polled by LinkedIn’s Information Security Community and Crowd Research Partners, 74% of the
You feel like you’ve finally gotten this network security issue under control. Comprehensive and expensive security solutions have been put in place. But to be effective, every one of those solutions needs to be proactively monitored and managed, with their settings reviewed, tweaked and adjusted
Ransomware continues to wreak havoc on organizations of every size. Attack frequency is up, ransom demands are growing. Every Bitcoin payment provides a new incentive for cyber criminals to improve their technology and methods of attack. The payload contained in most phishing emails is now
A couple of months ago, Verizon’s 2017 Data Breach Report confirmed that 80% of all successful network attacks take place because of weak credentials. We took that opportunity to review the best methods for creating a strong password. We’re glad we did, because a new study released last week
We’ve spent the past month exploring (and busting) a number of myths that have grown up around information security. We know now that remaining compliant with regulations can’t make you secure. We know now that pen tests and vulnerability scans alone won’t keep you on the right side of
143,000,000 Victims. Any Lessons? When faced with the almost incomprehensible scope of last month’s Equifax episode, words like “breach” and “hack” seem inadequate to convey the scope of the incident. “Catastrophe” may be closer. Consider: The number of victims is equivalent to the
© 2021 SLPowers, All Rights Reserved. | Privacy Policy | Site Map