Security Management

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes January 2016 – Review

January 12, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for January 2016. This patch update closes 23 vulnerabilities in SAP products (including ones closed after the second Tuesday of the previous month and before the second Tuesday of this month).

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

How to Calculate ROI and Justify Your Cybersecurity Budget

December 18, 2015 Added by:Ilia Kolochenko

If you speak with management about money – speak their language and you will definitely get what you need.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Why Companies Fail to Secure Their Web Apps

December 14, 2015 Added by:Ilia Kolochenko

The five things that companies do to make hacking into their websites and web applications even easier for the hackers.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes December 2015 - Review

December 09, 2015 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for December 2015. This patch update closes 26 vulnerabilities in SAP products.

Comments  (0)

B1ea789c3db7f59b11f88e8980c38e7b

CISOs: Five Ways to Ramp Up Your Security Strategy

December 08, 2015 Added by:Kirsten Bay

Where is a cyber security professional to begin when the stakes are set against the corporation? The key is better preparation. Below are five steps that will provide an approach to help build a strategy that offers the potential to outsmart the attacker.

Comments  (0)

8eb7be5a13cc39a3e56b78aba08b2039

Playing Hide and Seek In the Cloud

December 08, 2015 Added by:Or Katz

This article will show the unique power of threat intelligence utilizing cloud networks and present a case study that find and correlate those malicious needles into insightful and actionable intelligence.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

68209dc20595f15c48ddcfbe866ef7b1

Organizations Must Wake Up To Hidden Security Vulnerabilities

December 03, 2015 Added by:Darren McCue

Time and again we see companies neglecting to protect themselves at the most basic, key levels – on both the physical and digital sides – leaving dangerous gaps in coverage to be exploited farther down the complexity chain.

Comments  (0)

64f027640f63616a277e92096313264f

From CSO to CIRO: Taking Charge of Third-Party Risk

December 02, 2015 Added by:James Christiansen

CSOs need to meet the challenge of third-party risk management head on. It’s time to execute on a larger risk strategy: managing the risk posture for your organization. This job is bigger than any single department—for any single company, in fact.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Why Creating Automated User Provisioning Workflows is Important

December 01, 2015 Added by:Identropy

User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.

Comments  (0)

D3952b85dfe9e8b3b9c453532beb7208

Leveraging Graph Technology to Securely Grant Employee Access

November 12, 2015 Added by:Emil Eifrem

Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.

Comments  (0)

4238fc46fe869de66700ec14d6738248

File Insecurity: The Final Data Leakage Frontier

November 11, 2015 Added by:Scott Gordon

In today’s digitally collaborative business, file security must accommodate a broader set of applications, constituents and collaboration mechanisms including the use of cloud-based storage and sharing platforms.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes November 2015 - Review

November 11, 2015 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for November 2015. This patch update closes 23 vulnerabilities in SAP products.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes October 2015 - Review

November 10, 2015 Added by:Alexander Polyakov

SAP released the monthly critical patch update for October 2015. This patch update closes 29 vulnerabilities in SAP products, 15 of which are high priority, some of them belong to the SAP HANA security area.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »