Security Awareness

2419b9dc2aa15bd1efadeed440a28aad

From the Medicine Cabinet to the Data Center – Snooping Is Still Snooping

November 03, 2017 Added by:Jackson Shaw

A global survey revealed a lot of eye-opening facts about people’s snooping habits on their company’s network.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Thinking Outside the Suite: Adding Anti-Evasive Strategies to Endpoint Security

November 03, 2017 Added by:Eddy Bobritsky

Given the recent surge of virulent, global malware and ransomware, anti-evasion defenses are a smart place to start augmenting existing endpoint security by layering on innovative, focused solutions.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Cyber Security in Today’s Ever-Changing World

October 26, 2017 Added by:Steve Durbin

The contours of cybercriminal enterprise have grown to become specialized, like that of mainstream business, operating out of conventional office spaces, providing a combination of customer support, marketing programs, product development, and other trappings of the traditional business world.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

Calming the Complexity: Bringing Order to Your Network 

October 20, 2017 Added by:Reuven Harrison

With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

#NCSAM: Third-Party Risk Management is Everyone’s Business

October 17, 2017 Added by:Scott Schneider

This post explores one of the weekly themes for National Cyber Security Awareness Month, “Cybersecurity in the Workplace is Everyone’s Business.”

Comments  (0)

74a3faa048e151b7a9b61267399d79e3

Put Your S3 Buckets to the Test to Ensure Cloud Fitness

October 13, 2017 Added by:Tim Prendergast

Security measures that are critical to attain the basic level of security for your S3 buckets, which are always going to be a target because they store sensitive data.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

Cyber Security in the Workplace Is Everyone’s Obligation

October 11, 2017 Added by:Joseph Carson

Cyber security is no longer just a technology challenge—it’s a test for everybody who uses and interacts with technology daily. That means: everyone in your organization.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Deceptioneering: Exploring How Humans Are Wired for Deception

September 23, 2017 Added by:Perry Carpenter

No matter how much security technology we purchase, we still face a fundamental security problem: people. They are both our biggest threat and they serve as our last line of defense.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

How Secure Are Your Company’s Social Accounts?

September 07, 2017 Added by:Jackson Shaw

It’s really time to start protecting your Facebook, LinkedIn, Twitter, Tumblr, Instagram and all other social media systems with as much security as your accounts payable or human resources system.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security Awareness: Watch-Out for Hurricane Harvey Online Scams

August 28, 2017 Added by:Dan Lohrmann

As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

NIST Offering Much Needed Guidance for Neglected SMBs

August 11, 2017 Added by:Avi Bartov

The NIST framework provides the much-needed guidance that organizations of any size can use to identify their major risks in cyberspace.

Comments  (0)

F3828ca8c8a9ac7e4fc6a5cc12f52066

What Is Hypervisor-based Security and Why Is It Important in Stopping Zero-Day Exploits?

August 11, 2017 Added by:Bogdan Botezatu

Utilizing the hypervisor for security measures is a crucial paradigm shift, as the number of techniques for utilizing exploits remains very small.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – August 2017

August 11, 2017 Added by:Alexander Polyakov

The August 2017 set of SAP Security Notes consists of 19 patches with the majority of them rated medium.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Evasive Malware on the Rise: Time to Stop Stealth Attacks in their Tracks

August 11, 2017 Added by:Eddy Bobritsky

We need to develop and implement creative solutions that are broadly effective at turning “easy target” endpoints into dead ends for hackers and their tricks.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »