Enterprise Security

7783bc8790e6328988ddfa4f92055e12

Encryption and Privacy Debates Highlight Serious Challenges for Both Consumers and Businesses

March 24, 2016 Added by:Robert Grapes

As we become more connected through wearables, mobile devices, IoT devices in our homes, security cameras, health trackers, and online bank accounts, we become exponentially more vulnerable to criminal attacks and government intrusion. Civil liberties, anonymity, personal safety, home security, children safety—all is at risk.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Exploit Kits, Android Malware Dominated 2015: Dell

February 22, 2016 Added by:InfosecIsland News

Dell has released its Dell Security Annual Threat Report 2016, revealing that key trends defining the threat landscape, ranging from new, aggressive tactics employed by adversaries to a massive increase in malware attacks in 2015.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Denying the Deniers: Tackling DDoS Attacks

February 17, 2016 Added by:Avishai Wool

As DDoS continues to be used as a cyber-weapon against websites and online resources, organizations should ensure that they have a response plan in place that includes these mitigation techniques, to help deny attempted denial-of-service attacks.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Five Rules to Conduct a Successful Cybersecurity RFP

February 16, 2016 Added by:Ilia Kolochenko

It becomes more and more difficult to distinguish genuine security companies, with solid in-house technologies, and experts with flashy marketing and FUD (Fear, Uncertainty, Doubt) tactics. This makes the process of cybersecurity RFP (Request For Proposal) more complicated and challenging for organizations of all sizes.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes February 2016 - Review

February 10, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for February 2016, which closes 23 vulnerabilities in SAP products.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Five Security Threats Businesses Should Prepare for in 2016

January 28, 2016 Added by:Steve Durbin

After reviewing the current threat landscape, there are five prevalent security threats that the Information Security Forum believes businesses need to prepare for in 2016. These include, but are not limited to, the unintended consequences of state intervention, Big Data, mobile applications and the Internet of Things (IoT), cybercrime and the growing skills gap in the information security industr...

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Key Risk Management Issues For 2016

January 13, 2016 Added by:InfosecIsland News

Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes January 2016 – Review

January 12, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for January 2016. This patch update closes 23 vulnerabilities in SAP products (including ones closed after the second Tuesday of the previous month and before the second Tuesday of this month).

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

How to Calculate ROI and Justify Your Cybersecurity Budget

December 18, 2015 Added by:Ilia Kolochenko

If you speak with management about money – speak their language and you will definitely get what you need.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes December 2015 - Review

December 09, 2015 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for December 2015. This patch update closes 26 vulnerabilities in SAP products.

Comments  (0)

8eb7be5a13cc39a3e56b78aba08b2039

Playing Hide and Seek In the Cloud

December 08, 2015 Added by:Or Katz

This article will show the unique power of threat intelligence utilizing cloud networks and present a case study that find and correlate those malicious needles into insightful and actionable intelligence.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »