Latest Blog Posts

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes April 2016 - DoS Vulnerabilities on the Rise

April 14, 2016 Added by:Alexander Polyakov

SAP's April security patches resolve 26 vulnerabilities in SAP products, including 19 SAP Security Patch Day Notes and 7 Support Package Notes.

Comments  (0)

0691ab2a89db6dae5b9845dee3dd63a4

Cloud Email Applications Could Put Your Corporate Data at Risk

April 12, 2016 Added by:Yotam Gutman

Third party email cloud application could expose the organizations data since employees now have the ability to grant applications access to their corporate information

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

Adobe Flash Player Issues Offer Endpoint Lessons

April 12, 2016 Added by:Amir Geri

The vulnerabilities found in Flash Player have forced Adobe to issue out security patches yet again. Whether the decision is to uninstall Flash entirely or ensure that all updates have been completed across the enterprise, the issue IT practitioners face is related to compliance.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Encrypted Messaging App Signal Desktop Launches in Public Beta

April 11, 2016 Added by:Ionut Arghire

The Signal secure communication application is now available for all desktop users, after being available via an invitation program only for the past few months.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

"Cyber AIR" Act Would Direct FAA to Establish Cybersecurity Standards for Aircraft

April 08, 2016 Added by:InfosecIsland News

Senator Edward Markey (D-Mass.) has proposed the "Cyber AIR" Act, which would direct the FAA to establish cybersecurity standards for aircraft.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

U.S. and Canada Issue Joint Alert on Ransomware

April 06, 2016 Added by:Ionut Arghire

Ransomware has recently become one of the biggest cyber threats to both end users and enterprises, and the United States DHS and the Canadian Cyber Incident Response Centre (CCIRC) have released a joint alert on ransomware threats.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Insider Threats in Today's Digital Age

April 05, 2016 Added by:Steve Durbin

Most research on the insider threat focuses on malicious behavior. However, insider negligence and insider accidents comprise a greater and growing proportion of information security incidents. Chief Information Security Officers (CISOs) who limit their thinking to malicious insiders may be gravely miscalculating the risk.

Comments  (0)

98839ab8621ab5d1df4b86de3eaa64cb

Five Key Security Questions to Ask Your Enterprise Communications Vendor

April 05, 2016 Added by:Michael Machado

The more questions you ask, the more you, as a customer, will have the information you need to determine if a cloud vendor is ready to be your partner in the shared security model that cloud computing requires. Here are five to start with for your Unified Communications as a Service (UCaaS) vendor.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Protecting Yourself (and Your Organization) from Ransomware

April 04, 2016 Added by:Dan Lohrmann

While media attention has focused on global terrorist incidents and the presidential primaries, a growing number of business emergencies caused by ransomware are sweeping the world. The risk of this situation escalating into a significant public- or private-sector crisis is growing.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Security Pros Not Confident in Ability to Fight Ransomware

April 03, 2016 Added by:Ionut Arghire

Only 38 percent of security professionals are "very confident" in their company’s ability to successfully deal with the increasing ransomware threat, a new survey reveals.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

WordPress and Joomla Sites Hacked to Host Malicious JavaScript Code

April 03, 2016 Added by:Ionut Arghire

Over the past few months, hackers have been abusing popular JavaScript library jQuery to inject malicious scripts into the head sections of websites powered by WordPress and Joomla, Avast researchers say.

Comments  (0)

05a24d7e4020553c4a923a0d8126d8c9

Reducing the Attack Surface is a Fool’s Errand

April 01, 2016 Added by:Paul Morville

This April Fool’s Day, let’s acknowledge that a security strategy focused exclusively on patching and prevention is a fool’s errand and let’s move towards an adaptive approach that includes prevention, detection, continuous visibility and response.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Why You Should Move Security Away from Security

March 31, 2016 Added by:Nimmy Reichenberg

Automating your security processes and aligning the various groups within your IT department is key to successfully migrating selected operations away from your security team.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Malvertising Attack Hits Top Australian Classified Site

March 29, 2016 Added by:InfosecIsland News

Free classified advertising site Gumtree was hit by a malvertising attack that resulted in users being exposed to the Angler exploit kit (EK), researchers at Malwarebytes say.

Comments  (0)

7783bc8790e6328988ddfa4f92055e12

Encryption and Privacy Debates Highlight Serious Challenges for Both Consumers and Businesses

March 24, 2016 Added by:Robert Grapes

As we become more connected through wearables, mobile devices, IoT devices in our homes, security cameras, health trackers, and online bank accounts, we become exponentially more vulnerable to criminal attacks and government intrusion. Civil liberties, anonymity, personal safety, home security, children safety—all is at risk.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webinar: Why Risk-Aware Cultures Are More Critical To Success Than Ever Before

March 24, 2016 Added by:InfosecIsland News

Join MediaPro and Forrester Research analyst Nick Hayes on March 24th from 10-11am PDT for a webcast on how risk-aware cultures bolster brand resilience from the inside out.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »