January 13, 2017 Added by:Alexander Polyakov
SAP's first set of SAP Security Notes for 2017 includes 23 security patches, one considered Hot News (assessed 9.8 by CVSS base score v.3.0).
January 12, 2017 Added by:Nathan Wenzler
Any security program can benefit immediately by reviewing internal policies, improving the metrics used to measure their program's success, and consulting with legal counsel to ensure proper insurances and other risk mitigation plans are in place.
January 11, 2017 Added by:Nathan Burke
When a new threat is uncovered, an artificially intelligent system is able to apply its newly-found knowledge to all other systems in its network, launching investigations to find out whether other machines exhibit evidence of the threat or threat type.
December 23, 2016 Added by:Gary Southwell
Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.
December 23, 2016 Added by:Mike Kail
With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.
December 22, 2016 Added by:Jalal Bouhdada
Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?
December 21, 2016 Added by:Dan Lohrmann
A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.
December 16, 2016 Added by:Steve Durbin
When it comes to cyber security, it’s more important than ever for board members and core executives — especially those not directly involved with deploying security programs — to fully participate and contribute on a continuous basis.
December 15, 2016 Added by:Bernard Parsons
There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.