National Cyber Security Awareness Month spans October - even though we know all too well that security awareness is more than a monthlong educational campaign, it's a lifestyle.
That said, few would dispute that driving attention for 31 days of the calendar year toward the importance of safe and secure computing is a worthwhile endeavor, and that's what has kept the campaign, shortened to NCSAM - a partnership between the National Cyber Security Alliance and the U.S. Department of Homeland Security - alive and well since 2004
While the predominance of content you'll see is geared toward improving the security aptitude of the average online user, whether they be at home or in the office, here at Trustwave we want to make sure IT and security professionals are getting access to all they need to grow their competencies and craft.
So here are seven free creative and instructive resources that you can turn to expand your expertise around fighting cybercrime, protecting data and reducing your risk. Because if you're not aware, nobody will be.
Endpoints are where the fight against malicious hackers typically starts, as the computers and other devices that dot your perimeter are a favorite first target of your adversaries. But thanks to technologies like endpoint detection and response (EDR), the fight can end at the endpoint too. This new report from analyst firm Gartner spells out what to consider when choosing an EDR solution amid a growing marketplace
Training, education and policies may be strong in your organization, but without a culture in which security is fundamental to everything that everyone does, gains can be easily lost. At 25 pages and spread across six chapters, this e-book will amplify your efforts toward making security a collective effort that everybody wants to own and view not as a burden but a best practice.
An assortment of cyberthreats is ready to greet you around every corner. And while some may be painstakingly familiar to you, each one is unique and must be addressed in distinct ways. This slickly designed and skimmable e-book comes to the rescue with a brass-tacks breakdown of the top 12 digital dangers that today's businesses face (from phishing to the supply chain) and how you can address each of them internally - and when you need to call in the outside experts to lend a hand.
The security of databases is more front and center than ever before because they are the richest target. Some companies, however, may not be sure where to start and how far to go. This newly refreshed white paper is a starter's guide filled with clear and practical guidance for hardening your databases.
As businesses rush to implement IoT technologies to gain competitive advantage, security best practices are falling to the wayside. This report takes an in-depth look at the disparity between IoT adoption and cybersecurity readiness, and includes practical takeaways for both adopters and manufacturers.
Not every company has a fully grown incident readiness and response (IR) process and program in place. This handbook lays the groundwork for why mature IR is so important and then delivers a step-by-step guide for prepping for and facing up against a wide range of security incidents.
When historians look back on cybersecurity, one of the defining moments surely will be when the European Union's General Data Protection Act took effect in May. Ushering in a new era of consumer transparency and control, the GDPR also reshapes how businesses around the world must approach security and privacy - which is where we come in with this straightforward guide.
Based on a survey of 1,6000 information security decision-makers and influencers in six countries, the 2018 Security Pressures Report from Trustwave delves into the often-maddening world of keeping businesses safeguarded against cyberthreats, attacks and compromises. The 44-page report, now in its fifth year, measures more than a dozen pressure sources - from biggest threats and responsibilities to data breach repercussions to staffing levels - and breaks the findings out by respondents from the United States, Canada, United Kingdom, Australia, Singapore and Japan.
Want on-demand access to our brightest security experts delivered right to your desk? You can achieve that with our archive of webinars. Recent how-to topics include: Augmenting your security maturity, learning from data breaches, protecting web applications, complying with the General Data Protection Regulation and getting started with red teaming. Peruse the archives and find one that can help with your current needs.
Dan Kaplan is manager of online content at Trustwave.