How Walmart Uses a Purple Team to Improve Cyber-Resilience

Few if any, organizations on the planet operate at the size and scale of Walmart. Scale isn’t just about normal retail operations either; it also comes in play with how the organization handles its own security resiliency testing.

In a session at the RSA Conference here, Jason O’Dell, director of incident response and hunt at Walmart, explained how the world’s largest retailer uses an innovative approach known as purple teaming at scale to improve security and reduce risk.

Complete article on eweek.com

The Windows 10 security guide: How to safeguard your business

How do you configure Windows 10 PCs to avoid common security problems? There’s no software magic bullet, unfortunately, and the tools are different for small businesses and enterprises. Here’s what to watch out for.

It is tempting to think that the process of securing a Windows 10 device can be reduced to a simple checklist. Install some security software, adjust a few settings, hold a training session or two, and you can move on to the next item on your to-do list.

Alas, the real world is far more complicated than that.

Complete article on zdnet.com

How Americans Leave their Personal Info Open to Thieves

A new poll by CreditCards.com found that 92 percent of Americans have taken at least one big data security risk in the past year.

The most common error: reusing the same password online, which can increase odds of becoming a victim of identity theft. The poll found that more than eight in 10 U.S. adults (82 percent) recycle passwords, and most make this poor practice a habit. In fact, most internet users who do this use the same password at least half (61 percent) or all (22 percent) of the time, the poll said.

The poll noted that despite this and other sloppy data security behavior, Americans are very worried about ID theft. Almost half (46 percent) say realizing their identity had been stolen would be worse than discovering that burglars broke into their home (27 percent). The rest said both would be equally bad.

The survey lists four additional bad data security behaviors…

Complete article on securitymagazine.com

Black Hat and Defcon cybersecurity experts share tips on how to protect yourself

During the week of Black Hat and Defcon, tens of thousands of security experts and hackers flock to Las Vegas for the back-to-back conferences. They hold discussions on issues like smart cities getting hacked, two-factor authentication, and security issues with voice assistants.

It can all get a little technical. But with so much cybersecurity knowledge in one place, I decided to ask individual experts for a single useful cybersecurity tip for the average person.

Complete article on cnet.com

Cybersecurity pros are limiting their personal use of Facebook, survey says

About 65% of surveyed current and former attendees at the annual Black Hat USA security conference say they’re limiting their use of Facebook or not using it at all after the recent controversies over the company’s security practices, Black Hat reports.

The organization has surveyed its attendees on security matters annually since 2015, and the majority of those surveyed reported working in a computer security profession. This year’s survey generally found attendees pessimistic about the outlook for privacy and security.

Complete article on fastcompany.com

Less than half of paying ransomware targets get their files back

This according a study from security company CyberEdge, which found that for those hit by a ransomware infection the best bet is probably to just restore from a backup. The survey, based on a poll of information security professionals, found that less than half of those who pay a ransom demand end up getting their data back.

Complete article on theregister.co.uk