Enterprise Security

1689b3c5747846ae2dd3297b00fb0acb

Hackers Ghosting the Trail

August 18, 2016 Added by:Michael Patterson

Attackers are going to get in and you will be required to perform incident response. The first thing the security team will ask for is the logs. Make sure logs are backed up to a 2nd system or 3rd system and make sure a UDP forwarder is relaying the messages.

Comments  (0)

459a952dc77e8d9757246964dee7fd18

Pragmatic Steps to Manage File Data Leakage Risks

August 18, 2016 Added by:Scott Gordon

Next generation F-DRM solutions offer an effective and flexible technical control that can be applied today to reduce file data leakage risks across different infrastructure, collaboration methods, user types and business requirements.

Comments  (0)

8e3215d0f18771cb3287f2123ffb2cdc

What the Auto Industry Can Learn from Payments Sector about Cybersecurity

August 17, 2016 Added by:Johannes Lintzen

An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Back to Basics: How Simple Techniques Can Thwart Complex APT Attacks

August 11, 2016 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – August 2016

August 11, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for August 2016. This patch update closes 30 vulnerabilities in SAP products including 26 SAP Security Patch Day Notes and 4 Support Package Notes.

Comments  (0)

Ad62dd51cf8a9e3d667bcdd92d493ccc

One Encryption Backdoor Is One Too Many

August 11, 2016 Added by:Joe Levy

Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.

Comments  (0)

D48cea157203015572756b2608f4c51f

Navigating the Complexities of Secure Third-Party Access

August 03, 2016 Added by:Mark Carrizosa

Three industry influencers identify trends and priorities and discuss what they are doing within their own organizations to mitigate third-party risk.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Brexit Means for Global Security Professionals

July 27, 2016 Added by:Dan Lohrmann

The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Security Is from Mars, Application Delivery Is from Venus

July 14, 2016 Added by:Nimmy Reichenberg

Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

A View from the Top: The C-Suite Steps Up as Cyber Security Threats Surge

July 13, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives—especially those not directly involved with deploying security programs—to fully participate and contribute on a continuous basis.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

From Production Slumps to Industrial Espionage: Why the Manufacturing Sector Must Be Better Prepared for Cyber Attacks

July 12, 2016 Added by:Mirko Brandner

In a connected world, where digitization progresses rapidly and finds its way into our factories, we are inevitably faced with an ever-increasing level of vulnerabilities that lead to security breaches.

Comments  (0)

0133c663c244df033c2eeb2248dfee32

Fighting Alert Fatigue

July 06, 2016 Added by:Mike Paquette

By augmenting their efforts with behavioral analytics and machine learning, teams can be sure they reduce alert noise and fatigue while quickly identifying and addressing the issues that actually matter before they hurt their customers or the bottom line.

Comments  (0)

3149cfd3449309d3982042756d81a157

Why Passwords Are the New Exploits

June 28, 2016 Added by:Nick Bilogorskiy

In the age of stolen passwords, compromised credentials are the easiest way in, simpler than phishing, malware or exploits. “Password confirmation” tools are now readily available to find reused passwords matching any website.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

What a Risk-Based Approach to Security Means for Your Business

June 20, 2016 Added by:Steve Durbin

Executives are familiar with the benefits of cyberspace and how the Internet, and today’s usage of connected devices, increases innovation, collaboration, efficiency, competitiveness and commitment to customers, but many struggle with assessing the risks versus the rewards.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes June 2016 - Review

June 15, 2016 Added by:Alexander Polyakov

SAP's monthly critical patch update for June 2016 closes 21 vulnerabilities in SAP products including 15 SAP Security Patch Day Notes and 6 Support Package Notes.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

Why Your Next Generation Firewall Cannot Prevent Next Generation Threats

June 15, 2016 Added by:Ajit Sancheti

Next generation firewalls had a good ten year run and are still good for the network perimeter. But when it comes to protecting the inside of the enterprise perimeter, they lack significant capabilities.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked