Latest Posts

Eb7e8df20aa93ae571f506153de0fe84

Identifying and Patching Vulnerabilities in a Post-Microsoft Security Bulletin World

July 27, 2017 Added by:Ken Hilker

Last November Microsoft warned that the Security Bulletins on Patch Tuesday would be discontinued, and they followed through on their promise with the April 2017 edition

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

How Does UC in the Cloud Impact Your Security Posture?

July 20, 2017 Added by:Myk Konrad

To maintain the security posture of unified communications, enterprises must implement a holistic approach to security that extends from their infrastructure to the cloud.

Comments  (0)

6976e8f7c49ced75e060499dde816102

How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – July 2017

July 14, 2017 Added by:Alexander Polyakov

July 2017’s set of SAP Security Notes consists of 23 patches with the majority of them rated medium.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

WannaCry: How We Created an Ideal Environment for Malware to Thrive, and How to Fix It

July 12, 2017 Added by:Jesse McKenna

How in the world did we end up with a security paradigm where a malware infection can spread so rapidly and so broadly as WannaCry did?

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

NotPetya — 'Ransomware' That Spreads like a Worm

July 12, 2017 Added by:Sean Tierney

NotPetya techniques led researchers to believe the true goals of the attack was disruption rather than monetary gain.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Convenience Comes at a Steep Price: Password Management Systems & SSO

July 12, 2017 Added by:Alexandre Cagnoni

Many consumers and businesses are flocking to the mirage of safety offered by password management firms, which are only as strong as their weakest link (often humans).

Comments  (0)

0756e5785a4308aa22f17fa1757680bf

How Does Samba Compare to WannaCry?

July 05, 2017 Added by:Rotem Iram

Many reports are drawing comparisons between the Samba vulnerability and WannaCry, but they don't pose the same widespread risk.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

The Security Risk Within Smart Cities

June 30, 2017 Added by:Mirko Brandner

Smart cities offer great opportunities and, in terms of IoT innovations security, data protection and privacy have to be top priority if they should be profitable in the long run.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)