Latest Blog Posts

1743acee38ef6b8f211a139c25876919

Stop Doing Four Things—and Convince Your Execs and Board to Properly Fund Cybersecurity

March 28, 2017 Added by:Kevin Magee

If you want to convince your execs and board to properly fund cybersecurity, stop telling them scary stories and using Hollywood clichés to make your case.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webinar: How to Use Good, Actionable Threat Intelligence

March 21, 2017 Added by:InfosecIsland News

Join F5 Networks and SecurityWeek for this interactive webinar on March 22nd at 1PM ET, to learn what good, actionable threat intelligence looks like, and how to effectively use it to neutralize potential attacks before they strike.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Malvertising and Exploit Kits Still a Significant Threat: FireEye

March 18, 2017 Added by:InfosecIsland News

Malicious online ads and the exploit kits (EK) used to infect computers with various types of malware continue to pose a significant threat, FireEye warns.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – March 2017

March 17, 2017 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for March 2017. This patch update includes 35 SAP Notes (28 SAP Security Patch Day Notes and 7 Support Package Notes).

Comments  (0)

D39e8a0d81c2a146f879631550fb065b

GRC: Going Beyond the Acronym

March 10, 2017 Added by:Corey Wilburn

An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.

Comments  (0)

9426edcb04ba15a57df6d674f1c74db9

Why Is Digital Property Monitored Less than Physical Property?

March 09, 2017 Added by:Ajit Singh

If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past

March 09, 2017 Added by:Scott Schneider

Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Neutrino Bot Gets Protective Loader

March 07, 2017 Added by:Ionut Arghire

A recently observed variant of the multi-purpose Neutrino Bot is using a protective, obfuscated loader that is an integral part of the full package.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part Two — Best Practices

March 02, 2017 Added by:Logan Kipp

By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Security Policies Matter for Disaster Recovery

March 02, 2017 Added by:Avishai Wool

Prevention is no longer enough to ensure robust readiness to unplanned incidents and cyber threats. Organizations also need to ensure that their incident response is as slick and unified as possible.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part One — Anatomy of WordPress

March 01, 2017 Added by:Logan Kipp

Part One of #AskSecPro is an introduction to some of the infrastructure behind WordPress.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Access Management and the Automation of Things

February 21, 2017 Added by:Dean Wiech

Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – February 2017

February 17, 2017 Added by:Alexander Polyakov

SAP's February set of Security Notes consist of 22 patches, most of them fix missing authorization check vulnerabilities.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DigitalOcean Launches Public Bug Bounty Program

February 17, 2017 Added by:Ionut Arghire

Cloud computing platform DigitalOcean announced the public availability of its bug bounty program, after successfully running it in private mode.

Comments  (0)

A7a839ae03fd6cee0c4b6b7ff67127e9

What bicycle thefts can teach us about mobile security

February 17, 2017 Added by:Avi Rosen

Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »