January 12, 2016 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for January 2016. This patch update closes 23 vulnerabilities in SAP products (including ones closed after the second Tuesday of the previous month and before the second Tuesday of this month).
December 21, 2015 Added by:Dan Lohrmann
Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...
December 18, 2015 Added by:Ilia Kolochenko
If you speak with management about money – speak their language and you will definitely get what you need.
December 08, 2015 Added by:Kirsten Bay
Where is a cyber security professional to begin when the stakes are set against the corporation? The key is better preparation. Below are five steps that will provide an approach to help build a strategy that offers the potential to outsmart the attacker.
December 07, 2015 Added by:Steve Durbin
As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.
December 03, 2015 Added by:Darren McCue
Time and again we see companies neglecting to protect themselves at the most basic, key levels – on both the physical and digital sides – leaving dangerous gaps in coverage to be exploited farther down the complexity chain.
December 02, 2015 Added by:James Christiansen
CSOs need to meet the challenge of third-party risk management head on. It’s time to execute on a larger risk strategy: managing the risk posture for your organization. This job is bigger than any single department—for any single company, in fact.
December 01, 2015 Added by:Steve Durbin
Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.
December 01, 2015 Added by:Identropy
User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.
November 12, 2015 Added by:Emil Eifrem
Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.
November 11, 2015 Added by:Scott Gordon
In today’s digitally collaborative business, file security must accommodate a broader set of applications, constituents and collaboration mechanisms including the use of cloud-based storage and sharing platforms.
November 10, 2015 Added by:Alexander Polyakov
SAP released the monthly critical patch update for October 2015. This patch update closes 29 vulnerabilities in SAP products, 15 of which are high priority, some of them belong to the SAP HANA security area.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015