Latest Posts

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – January 2017

January 13, 2017 Added by:Alexander Polyakov

SAP's first set of SAP Security Notes for 2017 includes 23 security patches, one considered Hot News (assessed 9.8 by CVSS base score v.3.0).

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Neutrino Bot Distributed in Post-Holiday Spam Run

January 12, 2017 Added by:Ionut Arghire

A spam distribution campaign spotted just after the holiday season has ended is distributing the Neutrino Bot via a linked malicious Office document, Malwarebytes Labs security researchers warn.

Comments  (0)

D8b99a423ff6dd0a2b3436ad64038f7a

Why Simply Increasing Cybersecurity Staffing Won’t Resolve All of Today’s Issues

January 12, 2017 Added by:Nathan Wenzler

Any security program can benefit immediately by reviewing internal policies, improving the metrics used to measure their program's success, and consulting with legal counsel to ensure proper insurances and other risk mitigation plans are in place.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

Using Artificial Intelligence for Security Automation, Orchestration and Response

January 11, 2017 Added by:Nathan Burke

When a new threat is uncovered, an artificially intelligent system is able to apply its newly-found knowledge to all other systems in its network, launching investigations to find out whether other machines exhibit evidence of the threat or threat type.

Comments  (0)

D99975c323ad3ec7e199a4b5b1c374d7

Stop the Phishing Frenzy; Arm Against the Danger with Detection and Response

December 23, 2016 Added by:Gary Southwell

Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.

Comments  (0)

F142e224c520497854138dc9fabbac94

Stop Living with FUD: Build Security with Confidence, Assurance and Resiliency

December 23, 2016 Added by:Mike Kail

With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Security of IIoT Devices: Time to Operate in Tandem with the Drive for Productivity?

December 22, 2016 Added by:Jalal Bouhdada

Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

The Dark Side of the Force: Hacktivism Takes Center Stage in 2016

December 21, 2016 Added by:Dan Lohrmann

A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing Executive Buy In as the Cyber Security Threat Landscape Expands

December 16, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives — especially those not directly involved with deploying security programs — to fully participate and contribute on a continuous basis.

Comments  (0)

76accef69a60a94bb14766fe8bc324ef

The Home of Cyber Security Best Practice: Public or Private Sector?

December 15, 2016 Added by:Bernard Parsons

There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.

Comments  (0)