article thumbnail

Five steps to password policy compliance

IT Security Guru

In addition, Specops Password Policy, the paid option, provides a robust way for organizations to extend the built-in features provided with native Active Directory Password Policy with the following: Custom dictionary lists to disallow words or word variations common to your organization. Find and remove leaked passwords.

article thumbnail

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Security Boulevard

Meanwhile, an informal Tenable poll looks at cloud security challenges. For more information about the threat from quantum computing: Is Quantum Computing a Cybersecurity Threat? Check out best practices for preventing buffer overflow attacks. Plus, Europol offers best practices for banks to adopt quantum-resistant cryptography.

Banking 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Measure Security Performance, Not Policy Compliance

The Falcon's View

Specifically, if you think of policies as requirements, then you should be able to recast those as metrics and key performance indicators (KPIs) that are easily measured, and in turn are easily integrated into dashboards. are performing and make better-informed decisions about where to focus investments for improvements.

article thumbnail

Forging the Path to Continuous Audit Readiness

CyberSecurity Insiders

Second, the tasks required to ascertain control and policy compliance details, resolve violations and provide adherence proof are resource intensive and error prone. As audit frequency and range expand to meet multiple evolving specifications, how can organizations reduce issues, delays, and spend?

article thumbnail

How do Companies Process Sensitive Data and Why is That Important?

CyberSecurity Insiders

Keeping information secure from any theft activities in the digital world is necessary. But unfortunately, with everything going online, the digital world seems to be just as dangerous as the real world, especially when storing your personal information. . Employee data is quite similar to customer data.

article thumbnail

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

The Last Watchdog

Social networks offer a world of insights and information on almost anyone who has an account. About the essayist : Ofer Amitai is CEO of Portnox, which supplies network access control, visibility, management and policy compliance systems designed to help today’s complex networks run smoothly and securely.

article thumbnail

10 Reasons to Celebrate 2020

McAfee

During RSA 2020, Cyber Defense Magazine, the industry’s leading electronic information security magazine, named McAfee the Most Innovative Company in its Cloud Security category for McAfee MVISION Cloud. Most Innovative and Scalable Cloud and Endpoint Security Company. CASB Category Winner.