November 17, 2016 Added by:Peter Buttler
A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.
November 14, 2016 Added by:Alexander Polyakov
SAP’s critical patch update for November contains 16 SAP Security Notes, two rated Hot News.
November 11, 2016 Added by:Jeff Hussey
By replacing traditional IP addresses with cryptographic identities (CID), comprehensive security is enabled at the device level, rather than reinforcing a vulnerable perimeter with outdated and largely ineffective measures.
November 08, 2016 Added by:Slawek Ligier
If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.
November 05, 2016 Added by:Ionut Arghire
A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn.
October 25, 2016 Added by:Myk Konrad
With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.
October 20, 2016 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.
October 20, 2016 Added by:Dave Burton
If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.
October 18, 2016 Added by:Eduard Kovacs
Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.
October 12, 2016 Added by:Michelle Johnson Cobb
As cyberthreats have become more sophisticated, networks more complex and cybersecurity issues of greater concern at the board level, demand for skilled cybersecurity professionals has soared. Unfortunately, there just isn’t enough talent to fill all of the roles.
October 12, 2016 Added by:Vanishree Rao
While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.
October 07, 2016 Added by:Steve Durbin
Organizations face a daunting array of challenges interconnected with cybersecurity: the insatiable appetite for speed and agility, the growing dependence on complex supply chains, and the rapid emergence of new technologies.
September 30, 2016 Added by:Joe Weiss
Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).
September 28, 2016 Added by:Ori Eisen
If a company trusts their own product to not fail, the customer can too—with this level of trust ultimately reaching the average person. It’s a win-win-win.
September 26, 2016 Added by:InfosecIsland News
Please join Centrify and SecurityWeek for this live webinar on Tuesday, Sept. 27th at 1PM ET, when we will discuss guidance from the National Institute of Standards and Technology (NIST) along with best practices and regulation mandates.
September 23, 2016 Added by:Avishai Wool
Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.