Latest Posts

Ee5f058b283cdc6dba84464d453801d7

Decrypting the Gender Imbalance: Hiring Women in Cybersecurity

December 09, 2016 Added by:Michelle Johnson Cobb

Organizations that seek to achieve greater representation of women in their IT security teams should maintain a steady, multi-faceted approach to recruitment — and continually evaluate their performance in terms of the advancement and retention of women in this area.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Internet Companies Partner to Combat Terrorist Content

December 07, 2016 Added by:Ionut Arghire

Major Internet players, including Facebook, Microsoft, Twitter, and YouTube, are teaming up to create a database designed help combat the spread of terrorist content online.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

The 4 Cs of Automated Incident Response

December 06, 2016 Added by:Nathan Burke

We’re currently in a phase in security where there are an ever-expanding number of automated incident response solutions, and no standard method for judging quality or value.

Comments  (0)

8cfea2767deef845d26a5bde4448bf51

Cybersecurity and Donald Trump: Where Do We Go From Here?

December 02, 2016 Added by:Kasey Cross

Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.

Comments  (0)

18d2ccc39431a1f63d67dd3252263400

The Hidden Security Risks of Cloud APIs

December 02, 2016 Added by:Sam Rehman

With the inherent security flaws taken care of, cloud software can take full advantage of the benefits of APIs without exposing themselves or their clients to attack.

Comments  (0)

370ef523fe9b1e0fd202d26a56e3584a

Holiday Shopping Security Tips for Consumers

December 02, 2016 Added by:Dan Ross

Cyber Monday kicked off a month of great deals for consumers and high profits for online retailers. Unfortunately, this time of the year also offers hackers different ways to launch cyber-attacks, steal information, and compromise devices.

Comments  (0)

C42db1d900b3553c87ca1abc2c4cb0f9

5 Signs You Need to Upgrade Your Legacy IAM

December 02, 2016 Added by:James Litton

A modern identity and access management (IAM) solution is not a multi-year journey anymore.

Comments  (0)

F3c62aff0615016b198f1353210017a8

Mobile Endpoint Security: 3 Helpful Tips to Protect Sensitive Corporate Data

December 02, 2016 Added by:Brian NeSmith

Security is not achieved by implementing a product, and companies need to make sure they are actively securing their company every day.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Authorities Disrupt Massive Malware Management Platform

December 01, 2016 Added by:Ionut Arghire

As part of a four-year long investigation, Europol and global partners disrupted the international criminal infrastructure platform known as “Avalanche".

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Medusa DDoS Botnet Slams Russian Banks

November 18, 2016 Added by:Ionut Arghire

The recently discovered Medusa IRC bot used to carry out distributed denial of service (DDoS) attacks against the websites of a couple of Russian websites has emerged recently, researchers with the Russian security firm Doctor Web reveal.

Comments  (0)

74a3faa048e151b7a9b61267399d79e3

Why Security Compliance Is a Continuous Process, and Not Just a Check in the Box!

November 18, 2016 Added by:Tim Prendergast

In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Security vs. Privacy: Securing Your Critical Information Assets

November 17, 2016 Added by:Steve Durbin

Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.

Comments  (0)

8abfe8ac9ec214d68541fcb888c0b4c3

Norton Cyber Security Insights Report - November 2016

November 17, 2016 Added by:Peter Buttler

A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – November 2016

November 14, 2016 Added by:Alexander Polyakov

SAP’s critical patch update for November contains 16 SAP Security Notes, two rated Hot News.

Comments  (0)

506b5559f05c479155e6e12f61e31c2d

Solving the Incompatibility Problem Between Smart Network Security and Swift Operations Efficiency

November 11, 2016 Added by:Jeff Hussey

By replacing traditional IP addresses with cryptographic identities (CID), comprehensive security is enabled at the device level, rather than reinforcing a vulnerable perimeter with outdated and largely ineffective measures.

Comments  (0)

Cd4a401af99bbf084db76ad6044a5639

What We’re Learning about Ransomware, and How Security Is Stepping Up to the Task

November 08, 2016 Added by:Slawek Ligier

If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DOM XSS Vulnerability Impacts Over 70 Million Wix Websites

November 05, 2016 Added by:Ionut Arghire

A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – October 2016

October 20, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.

Comments  (0)

20913c01b73eb72bf3bbd8b570e4dfa4

Securing the Remedy Before the Breach

October 20, 2016 Added by:Eldar Tuvey

Businesses need to put strategic operations in place to ensure they can successfully move forward after a hack has taken place.

Comments  (0)