Breaches
March Madness Security Threats Can Drive Any Organization Mad!
March 14, 2016 Added by:Mark Parker
Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.
Comments (0)
Bringing Innovation into Cyberdefense Technologies
February 22, 2016 Added by:Larry Karisny
When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.
Comments (0)
Yes. The World Needs More Security Predictions
February 17, 2016 Added by:Dan Lohrmann
With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...
Comments (0)
What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?
December 21, 2015 Added by:Dan Lohrmann
Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...
Comments (0)
SAP Security Notes December 2015 - Review
December 09, 2015 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for December 2015. This patch update closes 26 vulnerabilities in SAP products.
Comments (0)
Managing Security Resources: It’s All About People and Awareness (Part II)
December 07, 2015 Added by:Steve Durbin
As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.
Comments (0)
Managing Security Resources: It’s All About People and Awareness (Part I)
December 01, 2015 Added by:Steve Durbin
Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.
Comments (0)
Leveraging Graph Technology to Securely Grant Employee Access
November 12, 2015 Added by:Emil Eifrem
Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.
Comments (0)
SAP Security Notes November 2015 - Review
November 11, 2015 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for November 2015. This patch update closes 23 vulnerabilities in SAP products.
Comments (0)
3 out of 4 Consumers Will Leave your Websites Because of Security Concerns
September 22, 2015 Added by:Peter Zavlaris
As part of the ongoing battle for eyeballs, marketing departments implement tracking technologies that encroach on customer privacy, while digital assets are cobbled together from third-party technology to accelerate time-to-market.
Comments (0)
Hackers and Threats: Cybercrime Syndicates Go Global
August 04, 2015 Added by:Steve Durbin
Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...
Comments (0)
Cloud Security: It’s in the Cloud - But Where? (Part III)
July 06, 2015 Added by:Steve Durbin
Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.
Comments (0)
Challenges and Solutions of Threat and Vulnerability Sharing in 2015
June 29, 2015 Added by:Shawn Masters
Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection
Comments (0)
VERT Vuln School: Return-Oriented Programming (ROP) 101
June 25, 2015 Added by:Tripwire Inc
In the beginning, there were stack buffer overflows everywhere.
Comments (0)
Researchers Demonstrate Stealing Encryption Keys Via Radio
June 24, 2015 Added by:Brian Prince
Researchers at Tel Aviv University have demonstrated a method of stealing encryption keys from a PC using a radio receiver small enough to hide inside a piece of pita bread.
Comments (0)
Half of All Websites Tested Failed Security and Privacy Assessment
June 23, 2015 Added by:Anthony M. Freed
Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.
Comments (0)
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids