Latest Posts
A Siri for Network Security: How Chatbots Can Enhance Business Agility
March 19, 2018 Added by:Avishai Wool
Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring
Comments (0)
Centering Your Security Strategy on Leadership, Resilience and Fundamentals
March 16, 2018 Added by:Steve Durbin
Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.
Comments (0)
An Open Letter to AWS CEO Andy Jassy on Cloud Security Innovation
March 16, 2018 Added by:Brian Ahern
Brian Ahern, CEO & Chairman of Threat Stack, writes an open letter to Amazon Web Services CEO Andy Jassy.
Comments (0)
Beat Them at Their Own Game: Understanding and Neutralizing Evasive Malware Tactics in the Face of Rising Attacks
March 16, 2018 Added by:Eddy Bobritsky
If there is any hope of disarming modern and well-equipped attackers, we have to beat them at their game.
Comments (0)
Increasing Board Accountability and Expertise Is Critical to Security and Risk Management
March 09, 2018 Added by:Greg Reber
The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.
Comments (0)
Number of Domains Hosting Crypto-Miners Up 725% in Four Months
March 07, 2018 Added by:Ionut Arghire
The number of websites hosting code that mines for crypto-coins using visitors’ CPU power went up a staggering 725% in a four-month period, Cyren reports.
Comments (0)
Today's Threat Landscape Demands User Monitoring
February 27, 2018 Added by:Eric Sun
For a complete picture of user behavior, you need visibility both on and off the corporate network.
Comments (0)
EDR for Everyone Is about Fighting Alert Fatigue
February 21, 2018 Added by:Liviu Arsene
Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.
Comments (0)
Researchers Detail Linux-Based “Chaos” Backdoor
February 20, 2018 Added by:Ionut Arghire
A Linux-targeting backdoor observed in live attacks in June last year was recently found to have been part of an older rootkit, GoSecure researchers reveal.
Comments (0)
Large Crypto-Mining Operation Targeting Jenkins CI Servers
February 20, 2018 Added by:Ionut Arghire
A large malicious crypto-mining operation has recently started targeting the powerful Jenkins CI server, Check Point security researchers have discovered.
Comments (0)
Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics
February 16, 2018 Added by:Ben Carr
Start planning now for the events on the horizon; hopefully you thought ahead for Pyeongchang – but remember Tokyo 2020 isn’t that far way.
Comments (0)
SAP Cyber Threat Intelligence Report – February 2018
February 16, 2018 Added by:Alexander Polyakov
The second set of SAP Security Notes in 2018 consists of 26 patches with the majority of them rated medium.
Comments (0)
The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking
February 09, 2018 Added by:Ross Rustici
Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.
Comments (0)
Think GDPR Won’t Affect Your U.S. Company? Guess Again
February 07, 2018 Added by:Ken Spinner
Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.
Comments (0)
Advancing the Usability of PKIs
February 06, 2018 Added by:Dan Timpson
If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.
Comments (0)
The Five Secrets to Making Security Awareness Work in 2018
January 29, 2018 Added by:Perry Carpenter
Are you ready to make 2018 a break-out year for your security awareness program?
Comments (0)
Crypto-Mining Is the Next Ransomware
January 19, 2018 Added by:Steve McGregory
Since new security threats surface every week, there is a good chance that more devices will be infected with cryptocurrency mining malware in the near future.
Comments (0)
Increasing Importance of Mobile Makes Malware a Priority
January 17, 2018 Added by:Asma Zubair
Businesses should fortify their high value apps with additional security precautions from the inside out.
Comments (0)
What Global Manufacturers Need to Know About Security in the Cloud
January 08, 2018 Added by:Srivats Ramaswami
Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.
Comments (0)
Security in Operational Technology: Five Top Trends in 2018
January 05, 2018 Added by:Jalal Bouhdada
Top five security trends to watch for in 2018