Latest Posts

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – December 2017

December 14, 2017 Added by:Alexander Polyakov

This set of SAP Security Notes consists of 19 patches with the majority of them rated medium.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

BankBot Targets Polish Banks via Google Play

December 12, 2017 Added by:Ionut Arghire

Two applications that managed to slip into Google Play despite being infected with the BankBot Trojan have been observed targeting the legitimate apps of Polish bank.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment

December 11, 2017 Added by:Perry Carpenter

As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?

Comments  (0)

Abd50ba6fa1aff83aff411c963b09ab5

Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job

December 11, 2017 Added by:Tim Critchley

A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.

Comments  (0)

514b3f589bbd84a29829326fa66dafcd

Unidentified Leak Paths Led to Successful Hack of South Korean Military by North Korea – Part I

December 11, 2017 Added by:Sanjay Raja

Continuous changes to the network landscape, including infrastructure, operating systems, and applications can cause organizational security policy and network defense configuration to become misaligned.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Cybersecurity’s Dirty Little Secret

December 06, 2017 Added by:Jackson Shaw

An upgrade to practices and technologies to eliminate the possibility of human error or lags due to cumbersome password administration practices, will add an additional layer of assurance and individual accountability.

Comments  (0)

5f8cbd66888e8076282b8c0508a17fd0

Four Ways to Protect Your Backups from Ransomware Attacks

November 22, 2017 Added by:Rod Mathews

Backups are a last defense and control from having to pay ransom for encrypted data, but they need protection also.

Comments  (0)

3013a8d01542d3101f0a905ab013f00a

Shadow IT: The Invisible Network

November 14, 2017 Added by:Chris Jordan

Shadow IT is the term most related to the risk associated with the threat that application awareness addresses.

Comments  (0)

708a1c1e996937464e2d045763bf3fc4

4 Questions Businesses Must Ask Before Moving Identity into the Cloud

November 08, 2017 Added by:Dave Hendrix

Whether you’re moving from an on-premise identity governance solution to the cloud or implementing a cloud-based identity governance solution for the first time, it’s important to take a close look at your organization and its needs before taking the next step.

Comments  (0)