Threat Modeling Simplified

Posted by & filed under Content - Highlights and Reviews, information security, Information Technology, IT, Operations, privacy, security, Tech.

by Sari Greene I cringe each time I hear the oft repeated declarations that “every company will be compromised” and that “it isn’t a matter of if, but when”. These statements are the basis of the FUD (fear, uncertainty and doubt) driven cyber sales machine. What is closer to the truth is that Internet connected… Read more »

What Every Business Needs to Know About Cyber Security Now

Posted by & filed under Business, Content - Highlights and Reviews, information security, Information Technology, Operations, security, Tech.

By Neil Ford Neil Ford writes about all aspects of information security for IT Governance Ltd, the international provider of best-practice information security solutions.    According to IBM/Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis, the average global cost of a data breach is now US$3.79 million. Although high-profile cybersecurity incidents affecting large… Read more »

Dig into National Cyber Security Awareness Month with these Safari Titles

Posted by & filed under Content - Highlights and Reviews, devices, information security, Information Technology, internet of things, IT, security.

In honor of National Cyber Security Awareness Month 2015, we have put together a list of some of the newest and most popular security titles available in Safari.     Abusing the Internet of Things by Nitesh Dhanjani The Internet of Things is growing everyday and the potential threats that can affect a future with millions of… Read more »

Three Questions for the authors of “The Architecture of Privacy”

Posted by & filed under Business, information security, Information Technology, security, Tech.

As we approach National Cyber Security Awareness Month, we kick off our Author Q&A series with Courtney Bowman, John K Grant and Ari Gesher, who along with Daniel Slate, authored The Architecture of Privacy, published this month by O’Reilly Media. In this practical guide, the authors describe how software teams can make privacy-protective features a core… Read more »

The virtues of going incognito: private web browsing

Posted by & filed under analytics, devices, information security, privacy, search, Web Development.

We’ve all been there. Your mind wanders during your daily routine and then suddenly your interest is piqued by a random, rogue question. It lingers persistently and blocks all other attempts at thought. You completely disregard the fact that it is 2:30 AM and turn to the one source of information that is reliable —… Read more »

Safari Supports Cyber Security Awareness Month via DoD Service Member Access Programs

Posted by & filed under articles, careers, Certification & Licensure, information security, jobs, Learning & Development, libraries, Press Releases, privacy, programming, Safari, security.

October, 2014 marks the 11th Annual National Cyber Security Awareness Month, sponsored by the Department of Homeland Security, in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center. Safari is proud to provide access to information security learning resources for active and retired military personnel via the Family and… Read more »