Breaches

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes December 2015 - Review

December 09, 2015 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for December 2015. This patch update closes 26 vulnerabilities in SAP products.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

D3952b85dfe9e8b3b9c453532beb7208

Leveraging Graph Technology to Securely Grant Employee Access

November 12, 2015 Added by:Emil Eifrem

Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes November 2015 - Review

November 11, 2015 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for November 2015. This patch update closes 23 vulnerabilities in SAP products.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

3 out of 4 Consumers Will Leave your Websites Because of Security Concerns

September 22, 2015 Added by:Peter Zavlaris

As part of the ongoing battle for eyeballs, marketing departments implement tracking technologies that encroach on customer privacy, while digital assets are cobbled together from third-party technology to accelerate time-to-market.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

BYOx: Developing and Deploying Effective Strategies to Safeguard Data

September 16, 2015 Added by:Steve Durbin

In today’s global, connected society, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, organizations need to manage risks in ways beyond those traditionally handled by the information security function, since new attacks will impact bot...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)

B8645aab12b6ba5e561fccefbf46cc0c

Challenges and Solutions of Threat and Vulnerability Sharing in 2015

June 29, 2015 Added by:Shawn Masters

Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

VERT Vuln School: Return-Oriented Programming (ROP) 101

June 25, 2015 Added by:Tripwire Inc

In the beginning, there were stack buffer overflows everywhere.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Researchers Demonstrate Stealing Encryption Keys Via Radio

June 24, 2015 Added by:Brian Prince

Researchers at Tel Aviv University have demonstrated a method of stealing encryption keys from a PC using a radio receiver small enough to hide inside a piece of pita bread.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Half of All Websites Tested Failed Security and Privacy Assessment

June 23, 2015 Added by:Anthony M. Freed

Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part II)

June 22, 2015 Added by:Steve Durbin

Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

7 Development AppSec Tricks to Keep the Hackers Away – Part 1

June 17, 2015 Added by:Tripwire Inc

The mammoth rise in cybercrime has made organizations revise their application security strategy and implement new techniques to safeguard their software. This is largely because traditional security methodologies, such as Manual Testing and Web Application Firewalls (WAF), have been rendered irrelevant due to evolving hacking techniques.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »