March, 2016

article thumbnail

How an improved responsive design and faster site increased visitor engagement by 104%

Elie

This blog post recounts how moving this site to a fast joyful responsive design with a lot of images improved session duration by 104% and decreased bounce rate by 53%

62
article thumbnail

Pen Testing Costs: The Business Value of Pen Testing Services

NopSec

On March 23rd 2016, I had the pleasure to participate in the Inaugural 2016 National Conference of Minority Cybersecurity Professionals in Washington, DC, masterfully organized by the International Consortium of Minority Cybersecurity Professionals. I was invited to take part in a panel talking about the “Business ROI for Penetration Testing” with three other cybersecurity colleagues, Charles Tendell, Andrew Malcolm, and Steve Magny.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ICO releases 12 step guide on the GDPR

Privacy and Cybersecurity Law

On Monday this week the UK Information Commissioner’s Office released its first guidance on the General Data Protection Regulation (GDPR): […].

52
article thumbnail

What Matters Most: Remediating Vulnerabilities

NopSec

Scanning is an important part of a well-established vulnerability risk management program. Vulnerability scanners allow you to identify the threats and weaknesses in your network. It also affords minimal compliance for companies subject to less stringent security rules, contributing to a false sense of security and system safety. Unfortunately, this means that some companies often stop there.

InfoSec 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The new Polish Surveillance Act – back door for law enforcement

Privacy and Cybersecurity Law

While US mass surveillance is heavily debated across Europe, the new Polish government swiftly moved to adopt a new set […].

article thumbnail

Two Key Steps to Stop DROWN…

NopSec

The information security industry is buzzing about the newest threat, DROWN. According to Drown Attack, “[it] is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS.”* The vulnerability affecting 1/3 of all HTTPS servers allows hackers to access passwords, financial data, credit card numbers, emails & trade secrets.