Latest Blog Posts
May 09, 2016 Added by:Ionut Arghire
Allowing organizations to identify and mitigate network vulnerabilities as early as possible, threat hunting is a new trend in enterprise security, recently released SANS Institute research reveals.
May 09, 2016 Added by:Vanishree Rao
Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.
May 03, 2016 Added by:Ionut Arghire
Steam recently patched security vulnerabilities in its system to prevent attackers from tapping into the data transmitted between a local client and the Steam network to view plain-text passwords or take over accounts.
May 03, 2016 Added by:Ganesh Kirti
We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).
April 26, 2016 Added by:Ionut Arghire
April 26, 2016 Added by:Jim Legg
While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.
April 22, 2016 Added by:Vanishree Rao
End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.
April 21, 2016 Added by:Ionut Arghire
Researchers at Cisco Talos have recently had a closer look at Nuclear and noticed that its operators have switched focus toward non-English users, but that they are targeting people in more than 10,000 different cities in over 150 countries worldwide.
April 20, 2016 Added by:Harvey Boulter
The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.
April 15, 2016 Added by:Tomer Saban
In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.
April 14, 2016 Added by:Ionut Arghire
A new malware downloader has been spotted recently, used to drop various malicious programs to compromised computers, including the Locky ransomware and the Kegotip and Pony info stealers.
April 14, 2016 Added by:Alexander Polyakov
SAP's April security patches resolve 26 vulnerabilities in SAP products, including 19 SAP Security Patch Day Notes and 7 Support Package Notes.
April 12, 2016 Added by:Yotam Gutman
Third party email cloud application could expose the organizations data since employees now have the ability to grant applications access to their corporate information
April 12, 2016 Added by:Amir Geri
The vulnerabilities found in Flash Player have forced Adobe to issue out security patches yet again. Whether the decision is to uninstall Flash entirely or ensure that all updates have been completed across the enterprise, the issue IT practitioners face is related to compliance.
April 11, 2016 Added by:Ionut Arghire
The Signal secure communication application is now available for all desktop users, after being available via an invitation program only for the past few months.