Latest Posts

D36d0936f0c839be7bf2b20d59eaa76d

Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

NIST Offering Much Needed Guidance for Neglected SMBs

August 11, 2017 Added by:Avi Bartov

The NIST framework provides the much-needed guidance that organizations of any size can use to identify their major risks in cyberspace.

Comments  (0)

F3828ca8c8a9ac7e4fc6a5cc12f52066

What Is Hypervisor-based Security and Why Is It Important in Stopping Zero-Day Exploits?

August 11, 2017 Added by:Bogdan Botezatu

Utilizing the hypervisor for security measures is a crucial paradigm shift, as the number of techniques for utilizing exploits remains very small.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – August 2017

August 11, 2017 Added by:Alexander Polyakov

The August 2017 set of SAP Security Notes consists of 19 patches with the majority of them rated medium.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Evasive Malware on the Rise: Time to Stop Stealth Attacks in their Tracks

August 11, 2017 Added by:Eddy Bobritsky

We need to develop and implement creative solutions that are broadly effective at turning “easy target” endpoints into dead ends for hackers and their tricks.

Comments  (0)

D47338e40e87fbbb10a052dd9c98ac89

Enterprises: Can You Handle 3,680 Phishing Emails per Week?

August 08, 2017 Added by:Kevin O'Brien

As the number of Business Email Compromise scams continues to grow, understanding whether a specific message is an attack requires fully integrated threat intelligence.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

Is Your Data at Risk Due to Third-Party Cloud Applications?

August 02, 2017 Added by:Scott Schneider

A simple mistake in one security setting can jeopardize the personal information of your customers. The costs of such carelessness are regulatory fines, a damaged reputation and a possible lawsuit.

Comments  (0)

02fe982eecea0dda30ffa3657a08097b

How to Choose the Right Data Protection Strategy

August 02, 2017 Added by:Dave Packer

A deep dive on data protection solutions and how they fit unique needs.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

Understanding Hacker Mindset Key for Website Security, Business Resilience

August 01, 2017 Added by:Avi Bartov

The traditional perimeter solutions are losing their effectiveness since hackers place more value in motive opportunities than they ever have previously.

Comments  (0)

76accef69a60a94bb14766fe8bc324ef

Why We Must Work Together to Support Our Cyber Start-ups

August 01, 2017 Added by:Bernard Parsons

With both the number and severity of cyber attacks only set to increase over the next few years, it is essential we do everything we can to support the next wave of homegrown cyber entrepreneurs, innovators and practitioners.

Comments  (0)

Bab14cc7bc9284548bf8b5c91ec19990

How Businesses Can Bolster Security and Stop Attacks Before they Happen

August 01, 2017 Added by:Chris Schueler

Organizations will have to realize that in-house efforts often won’t be enough when fighting off hackers with attacks they’ve sourced from around the world.

Comments  (0)

Eb7e8df20aa93ae571f506153de0fe84

Identifying and Patching Vulnerabilities in a Post-Microsoft Security Bulletin World

July 27, 2017 Added by:Ken Hilker

Last November Microsoft warned that the Security Bulletins on Patch Tuesday would be discontinued, and they followed through on their promise with the April 2017 edition

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

How Does UC in the Cloud Impact Your Security Posture?

July 20, 2017 Added by:Myk Konrad

To maintain the security posture of unified communications, enterprises must implement a holistic approach to security that extends from their infrastructure to the cloud.

Comments  (0)

6976e8f7c49ced75e060499dde816102

How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – July 2017

July 14, 2017 Added by:Alexander Polyakov

July 2017’s set of SAP Security Notes consists of 23 patches with the majority of them rated medium.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

WannaCry: How We Created an Ideal Environment for Malware to Thrive, and How to Fix It

July 12, 2017 Added by:Jesse McKenna

How in the world did we end up with a security paradigm where a malware infection can spread so rapidly and so broadly as WannaCry did?

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

NotPetya — 'Ransomware' That Spreads like a Worm

July 12, 2017 Added by:Sean Tierney

NotPetya techniques led researchers to believe the true goals of the attack was disruption rather than monetary gain.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Convenience Comes at a Steep Price: Password Management Systems & SSO

July 12, 2017 Added by:Alexandre Cagnoni

Many consumers and businesses are flocking to the mirage of safety offered by password management firms, which are only as strong as their weakest link (often humans).

Comments  (0)

0756e5785a4308aa22f17fa1757680bf

How Does Samba Compare to WannaCry?

July 05, 2017 Added by:Rotem Iram

Many reports are drawing comparisons between the Samba vulnerability and WannaCry, but they don't pose the same widespread risk.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

The Security Risk Within Smart Cities

June 30, 2017 Added by:Mirko Brandner

Smart cities offer great opportunities and, in terms of IoT innovations security, data protection and privacy have to be top priority if they should be profitable in the long run.

Comments  (0)