Enterprise Security

C834d47d31dd1a1b3371bda639105c59

How Does UC in the Cloud Impact Your Security Posture?

July 20, 2017 Added by:Myk Konrad

To maintain the security posture of unified communications, enterprises must implement a holistic approach to security that extends from their infrastructure to the cloud.

Comments  (0)

6976e8f7c49ced75e060499dde816102

How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – July 2017

July 14, 2017 Added by:Alexander Polyakov

July 2017’s set of SAP Security Notes consists of 23 patches with the majority of them rated medium.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

WannaCry: How We Created an Ideal Environment for Malware to Thrive, and How to Fix It

July 12, 2017 Added by:Jesse McKenna

How in the world did we end up with a security paradigm where a malware infection can spread so rapidly and so broadly as WannaCry did?

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

NotPetya — 'Ransomware' That Spreads like a Worm

July 12, 2017 Added by:Sean Tierney

NotPetya techniques led researchers to believe the true goals of the attack was disruption rather than monetary gain.

Comments  (0)

0756e5785a4308aa22f17fa1757680bf

How Does Samba Compare to WannaCry?

July 05, 2017 Added by:Rotem Iram

Many reports are drawing comparisons between the Samba vulnerability and WannaCry, but they don't pose the same widespread risk.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

E3fc80dfc564927d51a4d7320b45d6fa

Survey Shows Employers under Pressure to Keep Mobile Workers Safe

June 30, 2017 Added by:Vincent Geffray

According to a new report from Everbridge, 77% of employers said their employees would prioritize safety over privacy concerns when it comes to identifying their location during a critical event.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Lax IIoT Cybersecurity: the Perfect Breeding Environment for Industroyer

June 29, 2017 Added by:Jalal Bouhdada

In meeting the challenge posed by greater levels of threats and fewer cybersecurity specialists to meet them, a shift in focus is essential.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

The Upcoming Oracle CPU: Struggling to Keep Pace with Vulnerabilities

June 28, 2017 Added by:James E. Lee

Oracle's April 2017 update was its largest CPU to date. With the next CPU landing on July 18, there’s plenty to consider.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Malware Prevention Key to Countering Evasive Attack Techniques

June 28, 2017 Added by:Eddy Bobritsky

We can’t stay in the malware arms race by building a tool for every trick malware creators conjure up. It’s critical that we develop broadly applicable methods that frustrate their efforts by turning those tricks into defensive weapons.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Don’t get lost in translation when managing mixed firewall estates

June 27, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO at AlgoSec, looks at how organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks

Comments  (0)

81150be5971b06d836999bd9f01812f2

Make Sure We're Using the Same Language

June 27, 2017 Added by:Jay Kelley

Punycode (a way to represent various non-ASCII characters) can be used for malicious purposes, as a Chinese researcher discovered earlier this year.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – June 2017

June 15, 2017 Added by:Alexander Polyakov

In June 2017, SAP released 29 Security Notes, slightly more than the average number of 25 fixes per month released so far in 2017.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

You Can't Hire Your Way Out Of The Skills Shortage... Period.

June 07, 2017 Added by:Nathan Burke

While there has been some optimism around the potential for closing the massive cybersecurity skills gap by training more people, training alone will not address the massive skills gap the country faces.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

WannaCry and Jaff: Two Different Malware Attacks with A Common Goal

June 02, 2017 Added by:Sean Tierney

On Friday, May 12, two separate ransomware attacks were unfolding, each both using different distribution capabilities and malware.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »