December 02, 2016 Added by:Brian NeSmith
Security is not achieved by implementing a product, and companies need to make sure they are actively securing their company every day.
December 01, 2016 Added by:Ionut Arghire
As part of a four-year long investigation, Europol and global partners disrupted the international criminal infrastructure platform known as “Avalanche".
November 18, 2016 Added by:Ionut Arghire
The recently discovered Medusa IRC bot used to carry out distributed denial of service (DDoS) attacks against the websites of a couple of Russian websites has emerged recently, researchers with the Russian security firm Doctor Web reveal.
November 18, 2016 Added by:Tim Prendergast
In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.
November 17, 2016 Added by:Steve Durbin
Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.
November 17, 2016 Added by:Peter Buttler
A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.
November 14, 2016 Added by:Alexander Polyakov
SAP’s critical patch update for November contains 16 SAP Security Notes, two rated Hot News.
November 11, 2016 Added by:Jeff Hussey
By replacing traditional IP addresses with cryptographic identities (CID), comprehensive security is enabled at the device level, rather than reinforcing a vulnerable perimeter with outdated and largely ineffective measures.
November 08, 2016 Added by:Slawek Ligier
If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.
November 05, 2016 Added by:Ionut Arghire
A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn.
October 25, 2016 Added by:Myk Konrad
With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.
October 20, 2016 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.
October 20, 2016 Added by:Dave Burton
If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.
October 18, 2016 Added by:Eduard Kovacs
Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.
October 12, 2016 Added by:Michelle Johnson Cobb
As cyberthreats have become more sophisticated, networks more complex and cybersecurity issues of greater concern at the board level, demand for skilled cybersecurity professionals has soared. Unfortunately, there just isn’t enough talent to fill all of the roles.
October 12, 2016 Added by:Vanishree Rao
While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.