Security Management

Cd4a401af99bbf084db76ad6044a5639

What We’re Learning about Ransomware, and How Security Is Stepping Up to the Task

November 08, 2016 Added by:Slawek Ligier

If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – October 2016

October 20, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.

Comments  (0)

20913c01b73eb72bf3bbd8b570e4dfa4

Securing the Remedy Before the Breach

October 20, 2016 Added by:Eldar Tuvey

Businesses need to put strategic operations in place to ensure they can successfully move forward after a hack has taken place.

Comments  (0)

2271632958e3e89d01a458efe5e003bd

Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)

Ee5f058b283cdc6dba84464d453801d7

Closing the Cybersecurity Skills Gap — Calling All Women

October 12, 2016 Added by:Michelle Johnson Cobb

As cyberthreats have become more sophisticated, networks more complex and cybersecurity issues of greater concern at the board level, demand for skilled cybersecurity professionals has soared. Unfortunately, there just isn’t enough talent to fill all of the roles.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cyber Resilience Remains Vital to Sustaining Brand Reputation

October 07, 2016 Added by:Steve Durbin

Organizations face a daunting array of challenges interconnected with cybersecurity: the insatiable appetite for speed and agility, the growing dependence on complex supply chains, and the rapid emergence of new technologies.

Comments  (0)

D28106e94004d3770212d3902fbf14d5

What It Will Really Take to Build Trust in Security Companies

September 28, 2016 Added by:Ori Eisen

If a company trusts their own product to not fail, the customer can too—with this level of trust ultimately reaching the average person. It’s a win-win-win.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Going Global: Three Key Strategies for Managing International Firewalls

September 23, 2016 Added by:Avishai Wool

Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.

Comments  (0)

3dd71538193c3acd65ec65f95a45ac0b

What Is ID and Verification and Why Is It Such an Integral Part of Digital Life?

September 23, 2016 Added by:David Poole

ID&V is part of our lives and while there might be complaints about the inconvenience that obtrusive security plays in digital commerce, it is still an improvement on how things used to be.

Comments  (0)

E3e74019f2aa960c12029bbad242eca3

How to Choose the Right EDR solution for Your Organization

September 23, 2016 Added by:Tom Wayne

The need for an Endpoint Detection and Response (EDR) solution is at its highest for any organization who wants to ensure they are as protected as possible from the threat of attack.

Comments  (0)

Abc3973c3c7b09ae835fd09e06a4519f

Advanced Threat Protection Technologies Beyond Marketing

September 07, 2016 Added by:Roy Samson

The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.

Comments  (0)

1b95dd6456ee7ab6df000bf89b4acdcc

STOP, Collaborate and Listen: Where Employee Vulnerabilities Put Data at Risk

September 07, 2016 Added by:Ron Arden

Whether it is the company’s trade secrets, product designs, financial data or the personal information of customers, businesses must protect high value information from landing in the hands of the wrong individual or threat group.

Comments  (0)

B8c37e33defde51cf91e1e03e51657da

Insider Threat: Why Negligence Is More Dangerous Than Malevolence

August 26, 2016 Added by:Eric Aarrestad

When addressing the risk of Insider Threats, we must look beyond those who are intentionally doing harm and place equal emphasis on those who are simply doing their job.

Comments  (0)

0133c663c244df033c2eeb2248dfee32

What Elements Are Needed for Security Analytics Success?

August 23, 2016 Added by:Mike Paquette

Not all security analytics solutions are created equal. There are five key characteristics critically important to ensuring that your security analytics are effective and capable of stopping today’s advanced threats.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

Hackers Ghosting the Trail

August 18, 2016 Added by:Michael Patterson

Attackers are going to get in and you will be required to perform incident response. The first thing the security team will ask for is the logs. Make sure logs are backed up to a 2nd system or 3rd system and make sure a UDP forwarder is relaying the messages.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »