February 21, 2017 Added by:Dean Wiech
Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.
February 17, 2017 Added by:Alexander Polyakov
SAP's February set of Security Notes consist of 22 patches, most of them fix missing authorization check vulnerabilities.
February 17, 2017 Added by:Avi Rosen
Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.
February 16, 2017 Added by:Jeff Erramouspe
Ransomware is rampant and those who commit the attacks aren’t discriminating against any industry, company size, or company location.
February 08, 2017 Added by:Nathan Burke
With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.
February 07, 2017 Added by:Avishai Wool
Professor Avishai Wool, CTO and co-founder of AlgoSec, explains how external connections to partner networks should be managed to maximize security and efficiency
January 30, 2017 Added by:Steve Durbin
Enterprise risk management must build on a foundation of preparedness to create risk resilience by evaluating threat vectors from a position of business acceptability and risk profiling.
January 23, 2017 Added by:Myk Konrad
The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.
January 13, 2017 Added by:Alexander Polyakov
SAP's first set of SAP Security Notes for 2017 includes 23 security patches, one considered Hot News (assessed 9.8 by CVSS base score v.3.0).
January 12, 2017 Added by:Nathan Wenzler
Any security program can benefit immediately by reviewing internal policies, improving the metrics used to measure their program's success, and consulting with legal counsel to ensure proper insurances and other risk mitigation plans are in place.
December 23, 2016 Added by:Gary Southwell
Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.
December 23, 2016 Added by:Mike Kail
With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.
December 22, 2016 Added by:Jalal Bouhdada
Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?
December 21, 2016 Added by:Dan Lohrmann
A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015