Latest Posts

306708aaf995cf6a77d3083885b60907

Live Webinar: Combining Pen Testing & Incident Detection

May 16, 2017 Added by:Mike Lennon

Join SecurityWeek and Rapid7's Eric Sun for actionable takeaways from penetration testing engagements, and see how customers are combining detection technologies to find intruders earlier in the attack chain.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – May 2017

May 12, 2017 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for May 2017. This update includes 17 SAP Notes.

Comments  (0)

5ad5c9808e863169a36cd3b7c535d72b

Convenience vs. Control: Achieving the Right Security Balance

May 12, 2017 Added by:Kevin Cunningham

By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.

Comments  (0)

F91acd8d7037a996f8343c9b924b3f5d

The Enterprise IoT Security Checklist for Today - and Tomorrow

May 10, 2017 Added by:Zachary Crockett

Here's a list of components of an IoT system that must be reviewed for possible vulnerabilities.

Comments  (0)

21a45a9d0545830392fdf2b51c4d8c54

GDPR: Ignore It at Your Own Risk

May 09, 2017 Added by:Tomáš Honzák

The GDPR will change business as we know it, and the best we can do is make sure we’re prepared.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

May 09, 2017 Added by:Scott Schneider

Bad guys will continue to prey upon the path of least resistance - third parties. It’s up to you to ensure your organization takes a comprehensive and risk based approach - rather than focusing solely on compliance.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Cloud-Based Access Governance: Organizational Continuity Achieved

May 09, 2017 Added by:Dean Wiech

Cloud-based access governance can pull up a portal listing your web-based applications, whether they are hosted in the cloud or running locally within the organization, and can authenticate in the network.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

To Tackle IoT Security’s Murky Future, We Need Only to Look to the Past

May 05, 2017 Added by:Sean Tierney

To build secure IoT devices today, companies new and old should consider textbook security fundamentals that have been set by companies making networked devices for the past few decades.

Comments  (0)

B2469d3b365f73d091fac06f227950e2

When Is Apple.com Not Apple.com? Faked Punycode Domains Running Rampant

May 01, 2017 Added by:Magni R. Sigurdsson

We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

SWIFT Attacks are Evolving - Is Your Segmentation Strategy?

April 28, 2017 Added by:Jesse McKenna

As we continue to see attacks levied against banking and payment applications, the need for fine-grained visibility and control over all aspects of communication between system components will only rise.

Comments  (0)