Latest Posts


SAP Cyber Threat Intelligence Report – October 2016

October 20, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.

Comments  (0)


Securing the Remedy Before the Breach

October 20, 2016 Added by:Eldar Tuvey

Businesses need to put strategic operations in place to ensure they can successfully move forward after a hack has taken place.

Comments  (0)


U.S. Election Drives Increase in Malware and Spam

October 20, 2016 Added by:Ionut Arghire

The activity of malware and spam groups has intensified in the wake of United States presidential election, in an attempt to capitalize on the highly important upcoming event, Symantec warns.

Comments  (0)


Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)


Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27

October 18, 2016 Added by:Eduard Kovacs

Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.

Comments  (0)


Nitol Botnet Uses New Evasion Techniques

October 18, 2016 Added by:Ionut Arghire

The Nitol botnet was recently observed employing new evasion techniques in distribution attacks that leverage malicious macro-based documents, Netskope security researchers warn.

Comments  (0)


33 Million Evony User Accounts Emerge Online

October 16, 2016 Added by:Ionut Arghire

Over 33 million accounts from online gaming platform Evony have emerged online after hackers reportedly gained access to the platform’s main database in June this year.

Comments  (0)


Closing the Cybersecurity Skills Gap — Calling All Women

October 12, 2016 Added by:Michelle Johnson Cobb

As cyberthreats have become more sophisticated, networks more complex and cybersecurity issues of greater concern at the board level, demand for skilled cybersecurity professionals has soared. Unfortunately, there just isn’t enough talent to fill all of the roles.

Comments  (0)


Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!

October 12, 2016 Added by:Vanishree Rao

While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.

Comments  (0)


Cyber Resilience Remains Vital to Sustaining Brand Reputation

October 07, 2016 Added by:Steve Durbin

Organizations face a daunting array of challenges interconnected with cybersecurity: the insatiable appetite for speed and agility, the growing dependence on complex supply chains, and the rapid emergence of new technologies.

Comments  (0)