Latest Posts

D2dfc0582d6b23f510801d8a95d54c7c

Eight Steps to Migrate Your SIEM

July 22, 2019 Added by:Trevor Daughney

The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.

Comments  (0)

2bbe09d8431465f396a98305e7a1c5a6

What Call Center Fraud Can Teach Us about Insider Threats

July 22, 2019 Added by:Saryu Nayyar

Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.

Comments  (0)

9fa920b7e1a16185ac7565a871901719

Best Practices for Remote Workers’ Endpoint Security

July 22, 2019 Added by:Mathivanan Venkatachalam

One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Cisco Patches Critical Flaw in Vision Dynamic Signage Director

July 20, 2019 Added by:Ionut Arghire

Cisco released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability (CVE-2019-1917) that could allow attackers to execute arbitrary actions on the local system.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cybersecurity: Drones Will Soon Become Both Predator and Prey

July 19, 2019 Added by:Steve Durbin

Like other IoT devices, drones currently have very poor security controls, making them vulnerable to hijacking.

Comments  (0)

2de88989281faa7581932957d89e74d2

The Automotive Industry: Stepping up on Defense

July 19, 2019 Added by:David Barzilai

As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.

Comments  (0)

7b6799b0baa4ae08467bb98e99a89ae4

Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics

July 19, 2019 Added by:Filip Truta

Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing.

Comments  (0)

8864b99db2b2651e51dbd14fde0e361e

Today’s Top Public Cloud Security Threats …And How to Thwart Them

June 21, 2019 Added by:Michael Koyfman

In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Influence Operation Uses Old News of New Purposes

June 18, 2019 Added by:Ionut Arghire

A recently uncovered influence campaign presents old terror news stories as if they were new, likely in an attempt to spread fear and uncertainty, Recorded Future reports.

Comments  (0)

5864aed0a807a1e29050f9221c6cfa67

Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season

June 14, 2019 Added by:David Stuart

Tips for cleaning and securing your online data this spring.

Comments  (0)