Latest Posts


Security in Operational Technology: Five Top Trends in 2018

January 05, 2018 Added by:Jalal Bouhdada

Top five security trends to watch for in 2018

Comments  (0)


Bitcoin in the Darknet Ecosystem

January 05, 2018 Added by:Guy Caspi

Bitcoin is a rollercoaster for both investors and cybercriminals

Comments  (0)


The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)


Fake Android Security Tools Harvest User Data

January 04, 2018 Added by:Ionut Arghire

Tens of Android applications masquerading as security tools were found bombarding users with ads, tracking their location, and secretly harvesting user data, Trend Micro reports.

Comments  (0)


Hackers Wreak Havoc in 2017, is 2018 Ready to Battle?

January 04, 2018 Added by:Martin McKeay

If 2017 taught us anything, it’s that we have a long way to go to get ahead of adversaries. The biggest impact a security team can make in the new year is to understand how effectiveness of their protections are against the evolving threats.

Comments  (0)


Global Security Threats You Need to Know About in 2018

January 03, 2018 Added by:Steve Durbin

In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.

Comments  (0)


The IT Security Lessons from 2017

December 22, 2017 Added by:Avishai Wool

A look at the IT security lessons that can be learned from 2017

Comments  (0)


Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)


Google Patches High Risk Flaw in Chrome 63

December 18, 2017 Added by:Ionut Arghire

Google has released Chrome 63.0.3239.108 to the stable channel to address two security vulnerabilities in the browser.

Comments  (0)


SAP Cyber Threat Intelligence Report – December 2017

December 14, 2017 Added by:Alexander Polyakov

This set of SAP Security Notes consists of 19 patches with the majority of them rated medium.

Comments  (0)


Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)


BankBot Targets Polish Banks via Google Play

December 12, 2017 Added by:Ionut Arghire

Two applications that managed to slip into Google Play despite being infected with the BankBot Trojan have been observed targeting the legitimate apps of Polish bank.

Comments  (0)


Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment

December 11, 2017 Added by:Perry Carpenter

As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?

Comments  (0)


Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job

December 11, 2017 Added by:Tim Critchley

A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.

Comments  (0)


Unidentified Leak Paths Led to Successful Hack of South Korean Military by North Korea – Part I

December 11, 2017 Added by:Sanjay Raja

Continuous changes to the network landscape, including infrastructure, operating systems, and applications can cause organizational security policy and network defense configuration to become misaligned.

Comments  (0)


Cybersecurity’s Dirty Little Secret

December 06, 2017 Added by:Jackson Shaw

An upgrade to practices and technologies to eliminate the possibility of human error or lags due to cumbersome password administration practices, will add an additional layer of assurance and individual accountability.

Comments  (0)


Four Ways to Protect Your Backups from Ransomware Attacks

November 22, 2017 Added by:Rod Mathews

Backups are a last defense and control from having to pay ransom for encrypted data, but they need protection also.

Comments  (0)


Shadow IT: The Invisible Network

November 14, 2017 Added by:Chris Jordan

Shadow IT is the term most related to the risk associated with the threat that application awareness addresses.

Comments  (0)


4 Questions Businesses Must Ask Before Moving Identity into the Cloud

November 08, 2017 Added by:Dave Hendrix

Whether you’re moving from an on-premise identity governance solution to the cloud or implementing a cloud-based identity governance solution for the first time, it’s important to take a close look at your organization and its needs before taking the next step.

Comments  (0)


Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks

November 07, 2017 Added by:Asaf Cidon

Artificial intelligence to stop spear phishing sounds futuristic and out of reach, but it’s in the market today and attainable for businesses of all sizes, because every business is a potential target.

Comments  (0)