Enterprise Security

D36d0936f0c839be7bf2b20d59eaa76d

New Year’s Resolution 2017: Build Better Security Programs

January 30, 2017 Added by:Steve Durbin

Enterprise risk management must build on a foundation of preparedness to create risk resilience by evaluating threat vectors from a position of business acceptability and risk profiling.

Comments  (0)

C66e591693fd6e7b26fc5a60efb68817

Alan Turing, Undecidable Problems, and Malware

January 23, 2017 Added by:Kenneth Geers

In order to keep workers happy and productivity high, sometimes you have to run untrusted code. But that code should be run in quarantine, where it cannot damage your IT infrastructure.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

The Forgotten Security Frontier: The Phone Call

January 23, 2017 Added by:Myk Konrad

The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – January 2017

January 13, 2017 Added by:Alexander Polyakov

SAP's first set of SAP Security Notes for 2017 includes 23 security patches, one considered Hot News (assessed 9.8 by CVSS base score v.3.0).

Comments  (0)

D8b99a423ff6dd0a2b3436ad64038f7a

Why Simply Increasing Cybersecurity Staffing Won’t Resolve All of Today’s Issues

January 12, 2017 Added by:Nathan Wenzler

Any security program can benefit immediately by reviewing internal policies, improving the metrics used to measure their program's success, and consulting with legal counsel to ensure proper insurances and other risk mitigation plans are in place.

Comments  (0)

D99975c323ad3ec7e199a4b5b1c374d7

Stop the Phishing Frenzy; Arm Against the Danger with Detection and Response

December 23, 2016 Added by:Gary Southwell

Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.

Comments  (0)

F142e224c520497854138dc9fabbac94

Stop Living with FUD: Build Security with Confidence, Assurance and Resiliency

December 23, 2016 Added by:Mike Kail

With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Security of IIoT Devices: Time to Operate in Tandem with the Drive for Productivity?

December 22, 2016 Added by:Jalal Bouhdada

Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

The Dark Side of the Force: Hacktivism Takes Center Stage in 2016

December 21, 2016 Added by:Dan Lohrmann

A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing Executive Buy In as the Cyber Security Threat Landscape Expands

December 16, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives — especially those not directly involved with deploying security programs — to fully participate and contribute on a continuous basis.

Comments  (0)

0edff2c451ca736450f0872ef3e00314

Driving ROI from Threat Intelligence & Security Operations

December 14, 2016 Added by:Meny Har

Security operations teams can no longer afford the time lost with threat intelligence operating in a separate silo. Only by truly weaving TI into the core security fabric and workflow can it lead to accelerating threat mitigation.

Comments  (0)

E61bd0e5d76b76868ffe7b6574f67796

Top 10 Cloud and Security Predictions for 2017

December 14, 2016 Added by:Shehzad Merchant

In the coming year, we might see a number of significant changes with respect to both the public cloud and information security.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

The IT Security Flip: Inside More of a Concern than Outside

December 09, 2016 Added by:Ajit Sancheti

About half (49%) of IT security professionals are more concerned about internal threats than external threats.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

The 4 Cs of Automated Incident Response

December 06, 2016 Added by:Nathan Burke

We’re currently in a phase in security where there are an ever-expanding number of automated incident response solutions, and no standard method for judging quality or value.

Comments  (0)

8cfea2767deef845d26a5bde4448bf51

Cybersecurity and Donald Trump: Where Do We Go From Here?

December 02, 2016 Added by:Kasey Cross

Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.

Comments  (0)

C42db1d900b3553c87ca1abc2c4cb0f9

5 Signs You Need to Upgrade Your Legacy IAM

December 02, 2016 Added by:James Litton

A modern identity and access management (IAM) solution is not a multi-year journey anymore.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »