article thumbnail

Combatting Phishing with Enhanced Cybersecurity Awareness Programs

SecureWorld News

There, the employee is tricked into entering personal account details or other confidential information or into downloading an attachment that harbors a virus. Furthermore, the subject of information security training demands a certain level of technical proficiency and comprehension of all processes involved.

article thumbnail

Threat Intelligence and Security Awareness?

SecureWorld News

In our exclusive Behind the Scenes interview series, we take a deeper look at a topic that is relevant to the information security community. Today's conversation answers this question: How can threat intelligence strengthen security awareness? We're speaking with Sherrod DeGrippo, Sr. Is it going to be ransomware?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Choosing a Cyber Threat Intelligence Provider with Josh Ray

CTOvision

About Josh Ray : As Vice President for Verisign iDefense, Josh is responsible for the company’s enterprise Cyber Intelligence Program as well as the operations and product strategy for the iDefense business. Find out more information on Verisign here. Boston Download: Former MIT Dean Sentenced, NBC Could Cut Ch.

Research 150
article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

This forces IT and information security specialists to constantly enhance protection to effectively counter information security incidents related to malware distribution through rogue websites, links, and email attachments. They cannot download or transmit online content in any way.

article thumbnail

Bad Actor Using New Method to Avert Detection, Google Discovers

SecureWorld News

In a blog post, Neel Mehta, Information Security lead for Google, explains how a hacker has managed to break certificate code parsing to invade email inboxes and infect users with malware. This new hacking technique makes use of the OpenSUpdater software, a program developed for vicious purposes.

Google 59
article thumbnail

4 Tips for Writing Cybersecurity Policy

SecureWorld News

With so much information, where do you start when creating policies and procedures for your organization? No matter how long you have been in cybersecurity or which program you use, frameworks have many perks to offer for policy drafting. “If That's why Mangold recommends updating your information security policies at least annually.

article thumbnail

Strategic Cyber Intelligence: White Paper from INSA Provides Important Context For Enterprise Cyber Defense

CTOvision

The cyber council of INSA is a group of volunteers who come together to work topics associated with cyber security. Please see the press release below and also download their latest white paper. Strategic Cyber Intelligence is Essential to Business Security.