Latest Posts

41d5440f596e714d7ca33eccabc5fcab

Access Management and the Automation of Things

February 21, 2017 Added by:Dean Wiech

Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – February 2017

February 17, 2017 Added by:Alexander Polyakov

SAP's February set of Security Notes consist of 22 patches, most of them fix missing authorization check vulnerabilities.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DigitalOcean Launches Public Bug Bounty Program

February 17, 2017 Added by:Ionut Arghire

Cloud computing platform DigitalOcean announced the public availability of its bug bounty program, after successfully running it in private mode.

Comments  (0)

A7a839ae03fd6cee0c4b6b7ff67127e9

What bicycle thefts can teach us about mobile security

February 17, 2017 Added by:Avi Rosen

Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)

33e341295f31dc98f191961ddd26bcba

When Ransomware Strikes: Does Your Company Have a Data Disaster Recovery Plan?

February 16, 2017 Added by:Jeff Erramouspe

Ransomware is rampant and those who commit the attacks aren’t discriminating against any industry, company size, or company location.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DynA-Crypt Ransomware Steals and Deletes User Data

February 11, 2017 Added by:Ionut Arghire

A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers warn.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Managing External Connectivity to and From Your Network: Do’s & Don’ts

February 07, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, explains how external connections to partner networks should be managed to maximize security and efficiency

Comments  (0)

306708aaf995cf6a77d3083885b60907

2017 Singapore ICS Cyber Security Conference Call for Papers is Open! (APAC)

February 01, 2017 Added by:Mike Lennon

The official Call for Papers (presentations) for SecurityWeek's 2017 Singapore Industrial Control Systems (ICS) Cyber Security Conference, being held April 25–27 at the Fairmont Singapore is now open.

Comments  (0)