Tag: Risk

What Is the Best Way to Respond to a DDoS Attack?

As data breaches continue to occur, cyber attackers have demonstrated enhanced technical sophistication in the area of distributed-denial-of-service (DDoS) attacks. DDoS accounted for more than 55% of the overall annual cybercrime costs per...

38 Million Reasons to use Cryptography for Business

The tools of encryption and key management can (and should) be applied at numerous layers of business to protect, isolate, and control data. The technology is well-know and standardized. It is predictable and manageable and in no-way should be...

Software Security in the Supply Chain

This is a weekly post where we address questions of interest to the Application Information Security Community. What is the importance of software security in supply chain management?

4 Lessons Learned From a Security Breach

The infamous NSA security breach reminds us once again of the immense damage that can be caused by a single privileged user with an agenda. Privileged users, with their unlimited access to system and network resources, can access and leak all types...