Latest Posts

F3c62aff0615016b198f1353210017a8

Mobile Endpoint Security: 3 Helpful Tips to Protect Sensitive Corporate Data

December 02, 2016 Added by:Brian NeSmith

Security is not achieved by implementing a product, and companies need to make sure they are actively securing their company every day.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Authorities Disrupt Massive Malware Management Platform

December 01, 2016 Added by:Ionut Arghire

As part of a four-year long investigation, Europol and global partners disrupted the international criminal infrastructure platform known as “Avalanche".

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Medusa DDoS Botnet Slams Russian Banks

November 18, 2016 Added by:Ionut Arghire

The recently discovered Medusa IRC bot used to carry out distributed denial of service (DDoS) attacks against the websites of a couple of Russian websites has emerged recently, researchers with the Russian security firm Doctor Web reveal.

Comments  (0)

74a3faa048e151b7a9b61267399d79e3

Why Security Compliance Is a Continuous Process, and Not Just a Check in the Box!

November 18, 2016 Added by:Tim Prendergast

In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Security vs. Privacy: Securing Your Critical Information Assets

November 17, 2016 Added by:Steve Durbin

Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.

Comments  (0)

8abfe8ac9ec214d68541fcb888c0b4c3

Norton Cyber Security Insights Report - November 2016

November 17, 2016 Added by:Peter Buttler

A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – November 2016

November 14, 2016 Added by:Alexander Polyakov

SAP’s critical patch update for November contains 16 SAP Security Notes, two rated Hot News.

Comments  (0)

506b5559f05c479155e6e12f61e31c2d

Solving the Incompatibility Problem Between Smart Network Security and Swift Operations Efficiency

November 11, 2016 Added by:Jeff Hussey

By replacing traditional IP addresses with cryptographic identities (CID), comprehensive security is enabled at the device level, rather than reinforcing a vulnerable perimeter with outdated and largely ineffective measures.

Comments  (0)

Cd4a401af99bbf084db76ad6044a5639

What We’re Learning about Ransomware, and How Security Is Stepping Up to the Task

November 08, 2016 Added by:Slawek Ligier

If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DOM XSS Vulnerability Impacts Over 70 Million Wix Websites

November 05, 2016 Added by:Ionut Arghire

A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – October 2016

October 20, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.

Comments  (0)

20913c01b73eb72bf3bbd8b570e4dfa4

Securing the Remedy Before the Breach

October 20, 2016 Added by:Eldar Tuvey

Businesses need to put strategic operations in place to ensure they can successfully move forward after a hack has taken place.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. Election Drives Increase in Malware and Spam

October 20, 2016 Added by:Ionut Arghire

The activity of malware and spam groups has intensified in the wake of United States presidential election, in an attempt to capitalize on the highly important upcoming event, Symantec warns.

Comments  (0)

2271632958e3e89d01a458efe5e003bd

Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27

October 18, 2016 Added by:Eduard Kovacs

Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Nitol Botnet Uses New Evasion Techniques

October 18, 2016 Added by:Ionut Arghire

The Nitol botnet was recently observed employing new evasion techniques in distribution attacks that leverage malicious macro-based documents, Netskope security researchers warn.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

33 Million Evony User Accounts Emerge Online

October 16, 2016 Added by:Ionut Arghire

Over 33 million accounts from online gaming platform Evony have emerged online after hackers reportedly gained access to the platform’s main database in June this year.

Comments  (0)

Ee5f058b283cdc6dba84464d453801d7

Closing the Cybersecurity Skills Gap — Calling All Women

October 12, 2016 Added by:Michelle Johnson Cobb

As cyberthreats have become more sophisticated, networks more complex and cybersecurity issues of greater concern at the board level, demand for skilled cybersecurity professionals has soared. Unfortunately, there just isn’t enough talent to fill all of the roles.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!

October 12, 2016 Added by:Vanishree Rao

While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.

Comments  (0)