When developing a vulnerability strategy, it is important to think through the “what if” scenarios that an organization needs to defend against. However, if an organization is only taking into consideration its own knowledge of potential threats, then the plan will likely be incomplete.
In this slideshow, AlienVault, provider of Unified Security Management™ solutions and crowd-sourced threat intelligence, examines how to use crowd-sourced data to strengthen vulnerability management strategies to stay ahead of exploits.
Given the amount of sensitive information colleges and universities store, including student records, coursework and research, it's imperative that they readdress their current security strategies. ... More >>
These facts aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild. ... More >>
A new report aggregates and standardizes cyber crime data from the first six months of the year into cyber BI that provides some interesting insights. ... More >>