Top Stories

259aa33b32fc31717e8a18f2dc9edc19

Going Global: Three Key Strategies for Managing International Firewalls

September 23, 2016 Added by:Avishai Wool

Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.

Comments  (0)

Latest Posts

259aa33b32fc31717e8a18f2dc9edc19

Going Global: Three Key Strategies for Managing International Firewalls

September 23, 2016 Added by:Avishai Wool

Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.

Comments  (0)

3dd71538193c3acd65ec65f95a45ac0b

What Is ID and Verification and Why Is It Such an Integral Part of Digital Life?

September 23, 2016 Added by:David Poole

ID&V is part of our lives and while there might be complaints about the inconvenience that obtrusive security plays in digital commerce, it is still an improvement on how things used to be.

Comments  (0)

E3e74019f2aa960c12029bbad242eca3

How to Choose the Right EDR solution for Your Organization

September 23, 2016 Added by:Tom Wayne

The need for an Endpoint Detection and Response (EDR) solution is at its highest for any organization who wants to ensure they are as protected as possible from the threat of attack.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Automating Access May Be Best for Remote Users

September 21, 2016 Added by:Dean Wiech

When you are working remotely, things need to be very convenient, otherwise it becomes a huge aggravation of dealing with technical issues before you can get anything for work or school completed.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – September 2016

September 20, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for September 2016. This patch update closes 19 vulnerabilities in SAP products including 14 SAP Security Patch Day Notes and 5 Support Package Notes.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Demonstration of Hacking a Protective Relay and Taking Control of a Motor

September 15, 2016 Added by:Joe Weiss

At the 2016 ICS Cyber Security Conference we will be providing a demonstration and will take the SEL-751A used in a traditional motor control setting and compromise not only the SEL751A, but then take control of the motor.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Pokémon GO Security Threats Hit via Social Media

September 11, 2016 Added by:InfosecIsland News

Pokémon GO continues to remain a highly popular mobile app, and cybercriminals have found a new method of compromise by heading to social networks such as Facebook, Twitter, and Tumblr. A

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

LuaBot Linux Botnet Is Written in Lua Language

September 07, 2016 Added by:Ionut Arghire

A newly discovered Linux botnet that was coded using the Lua programming language is targeting Internet of Things (IoT) devices in addition to Linux systems and servers, researchers warn.

Comments  (0)

Abc3973c3c7b09ae835fd09e06a4519f

Advanced Threat Protection Technologies Beyond Marketing

September 07, 2016 Added by:Roy Samson

The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.

Comments  (0)

1b95dd6456ee7ab6df000bf89b4acdcc

STOP, Collaborate and Listen: Where Employee Vulnerabilities Put Data at Risk

September 07, 2016 Added by:Ron Arden

Whether it is the company’s trade secrets, product designs, financial data or the personal information of customers, businesses must protect high value information from landing in the hands of the wrong individual or threat group.

Comments  (0)