Enterprise Security

0a1751b23118a107c6c19cf551c34dca

Lax IIoT Cybersecurity: the Perfect Breeding Environment for Industroyer

June 29, 2017 Added by:Jalal Bouhdada

In meeting the challenge posed by greater levels of threats and fewer cybersecurity specialists to meet them, a shift in focus is essential.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

The Upcoming Oracle CPU: Struggling to Keep Pace with Vulnerabilities

June 28, 2017 Added by:James E. Lee

Oracle's April 2017 update was its largest CPU to date. With the next CPU landing on July 18, there’s plenty to consider.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Malware Prevention Key to Countering Evasive Attack Techniques

June 28, 2017 Added by:Eddy Bobritsky

We can’t stay in the malware arms race by building a tool for every trick malware creators conjure up. It’s critical that we develop broadly applicable methods that frustrate their efforts by turning those tricks into defensive weapons.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Don’t get lost in translation when managing mixed firewall estates

June 27, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO at AlgoSec, looks at how organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks

Comments  (0)

81150be5971b06d836999bd9f01812f2

Make Sure We're Using the Same Language

June 27, 2017 Added by:Jay Kelley

Punycode (a way to represent various non-ASCII characters) can be used for malicious purposes, as a Chinese researcher discovered earlier this year.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – June 2017

June 15, 2017 Added by:Alexander Polyakov

In June 2017, SAP released 29 Security Notes, slightly more than the average number of 25 fixes per month released so far in 2017.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

You Can't Hire Your Way Out Of The Skills Shortage... Period.

June 07, 2017 Added by:Nathan Burke

While there has been some optimism around the potential for closing the massive cybersecurity skills gap by training more people, training alone will not address the massive skills gap the country faces.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

WannaCry and Jaff: Two Different Malware Attacks with A Common Goal

June 02, 2017 Added by:Sean Tierney

On Friday, May 12, two separate ransomware attacks were unfolding, each both using different distribution capabilities and malware.

Comments  (0)

F21d07d4419b469fe0208b4a77f56c7b

Malware: The Gift That Keeps on Giving

June 02, 2017 Added by:Topher Tebow

Always be wary of unfamiliar USB devices, you never know what might be lurking in the darkness.

Comments  (0)

8259d904d48c0e93d3edf9383230de4c

Cloud Control: Key Points to Consider When Going to the Cloud

May 24, 2017 Added by:Luis Corrons

Establishing a solid plan when deciding to transition to the cloud is essential. By understanding the costs to store, transfer, and retrieve data, organizations can protect themselves from making a costly mistake.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

WannaCry Shows World the Need for Endpoint Security

May 24, 2017 Added by:Amir Geri

Ransomware attacks will continue to become more sophisticated and effective as the year goes on. It is now imperative that organizations prepare their networks and devices for a ransomware attack.

Comments  (0)

4d0ac884f6fdb0c44f281653697aa2cc

The Administrative Credentials Security Hole

May 24, 2017 Added by:Chris Stoneff

Here’s the problem: the existence of administrative credentials stored on machines throughout the network.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – May 2017

May 12, 2017 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for May 2017. This update includes 17 SAP Notes.

Comments  (0)

F91acd8d7037a996f8343c9b924b3f5d

The Enterprise IoT Security Checklist for Today - and Tomorrow

May 10, 2017 Added by:Zachary Crockett

Here's a list of components of an IoT system that must be reviewed for possible vulnerabilities.

Comments  (0)

21a45a9d0545830392fdf2b51c4d8c54

GDPR: Ignore It at Your Own Risk

May 09, 2017 Added by:Tomáš Honzák

The GDPR will change business as we know it, and the best we can do is make sure we’re prepared.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

May 09, 2017 Added by:Scott Schneider

Bad guys will continue to prey upon the path of least resistance - third parties. It’s up to you to ensure your organization takes a comprehensive and risk based approach - rather than focusing solely on compliance.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »