Enterprise Security

708a1c1e996937464e2d045763bf3fc4

4 Questions Businesses Must Ask Before Moving Identity into the Cloud

November 08, 2017 Added by:Dave Hendrix

Whether you’re moving from an on-premise identity governance solution to the cloud or implementing a cloud-based identity governance solution for the first time, it’s important to take a close look at your organization and its needs before taking the next step.

Comments  (0)

1652a0b8730e4cd4fec952262d1bed73

Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks

November 07, 2017 Added by:Asaf Cidon

Artificial intelligence to stop spear phishing sounds futuristic and out of reach, but it’s in the market today and attainable for businesses of all sizes, because every business is a potential target.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Category #1 Cyberattacks: Are Critical Infrastructures Exposed?

November 07, 2017 Added by:Jalal Bouhdada

Here's why the threat of attacks against critical national infrastructures should prompt industries to address their vulnerabilities before it’s too late.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security

November 03, 2017 Added by:Jonathan Bregman

The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

From the Medicine Cabinet to the Data Center – Snooping Is Still Snooping

November 03, 2017 Added by:Jackson Shaw

A global survey revealed a lot of eye-opening facts about people’s snooping habits on their company’s network.

Comments  (0)

3cf030edb83351856102235bcee85613

Healthcare Orgs in the Crosshairs: Ransomware Takes Aim

November 03, 2017 Added by:Sanjay Ramnath

Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Thinking Outside the Suite: Adding Anti-Evasive Strategies to Endpoint Security

November 03, 2017 Added by:Eddy Bobritsky

Given the recent surge of virulent, global malware and ransomware, anti-evasion defenses are a smart place to start augmenting existing endpoint security by layering on innovative, focused solutions.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Cyber Security in Today’s Ever-Changing World

October 26, 2017 Added by:Steve Durbin

The contours of cybercriminal enterprise have grown to become specialized, like that of mainstream business, operating out of conventional office spaces, providing a combination of customer support, marketing programs, product development, and other trappings of the traditional business world.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

Calming the Complexity: Bringing Order to Your Network 

October 20, 2017 Added by:Reuven Harrison

With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

#NCSAM: Third-Party Risk Management is Everyone’s Business

October 17, 2017 Added by:Scott Schneider

This post explores one of the weekly themes for National Cyber Security Awareness Month, “Cybersecurity in the Workplace is Everyone’s Business.”

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update

October 17, 2017 Added by:James E. Lee

In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.

Comments  (0)

74a3faa048e151b7a9b61267399d79e3

Put Your S3 Buckets to the Test to Ensure Cloud Fitness

October 13, 2017 Added by:Tim Prendergast

Security measures that are critical to attain the basic level of security for your S3 buckets, which are always going to be a target because they store sensitive data.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Is Your “Father’s IAM” Putting You at Risk?

October 13, 2017 Added by:Jackson Shaw

Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and that you can prove that all the access is right.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – October 2017

October 13, 2017 Added by:Alexander Polyakov

The October 2017 set of SAP Security Notes consists of 30 patches with the majority of them rated medium.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

Cyber Security in the Workplace Is Everyone’s Obligation

October 11, 2017 Added by:Joseph Carson

Cyber security is no longer just a technology challenge—it’s a test for everybody who uses and interacts with technology daily. That means: everyone in your organization.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »