Enterprise Security


SAP Security Notes November 2015 - Review

November 11, 2015 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for November 2015. This patch update closes 23 vulnerabilities in SAP products.

Comments  (0)


SAP Security Notes October 2015 - Review

November 10, 2015 Added by:Alexander Polyakov

SAP released the monthly critical patch update for October 2015. This patch update closes 29 vulnerabilities in SAP products, 15 of which are high priority, some of them belong to the SAP HANA security area.

Comments  (0)


How Well Do You Really Know Your Network?

October 06, 2015 Added by:Dan Lohrmann

Recent data breaches, and the international emphasis on critical infrastructure protection, are helping raise awareness of the importance of technology infrastructure improvements. Many organizations are currently building “next-generation” networks with new projects that are well funded. Don’t waste any opportunity to reinvent your network or infrastructure when you get the chance.

Comments  (0)


A Sharing Economy for Security

September 25, 2015 Added by:Anne Bonaparte

Hackers trade information to make their attacks more effective. If organizations want to beat back the bad guys, they must also learn to share.

Comments  (0)


Can CTF Players Replace Professional Penetration Testers?

September 23, 2015 Added by:Ilia Kolochenko

The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.

Comments  (0)


Webcast: Segmentation Beyond VLANs, Subnets, and Zones

September 01, 2015 Added by:InfosecIsland News

In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.

Comments  (0)


Microsoft Patches Critical IE Flaw Exploited in the Wild

August 18, 2015 Added by:Mike Lennon

Microsoft issued an emergency out-of-band update to fix a critical vulnerability (CVE-2015-2502) being actively exploited in the wild and affecting all versions of Internet Explorer from IE 7 through 11.

Comments  (0)


Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)


How to Tell a Landscaper From a Thief

July 20, 2015 Added by:Or Katz

Casually dismissed attack reconnaissance should be considered as valuable information and should be treated as such.

Comments  (0)


Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)


Challenges and Solutions of Threat and Vulnerability Sharing in 2015

June 29, 2015 Added by:Shawn Masters

Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection

Comments  (0)


Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)


Enable the Business? Sometimes Security Must Say “NO”…

June 25, 2015 Added by:Anton Chuvakin

As a security technologist you may be asked to do the impossible.

Comments  (0)


Thoughts on the Active Defense Debate

June 24, 2015 Added by:Joseph Pizzo

Organizations large and small need to run a better defense and get better at securing their assets, only then should an attack response be considered.

Comments  (0)


Privacy Concerns Changing the Playing Field for Brands

June 24, 2015 Added by:Peter Zavlaris

New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.

Comments  (0)


Half of All Websites Tested Failed Security and Privacy Assessment

June 23, 2015 Added by:Anthony M. Freed

Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »