Top Stories

9e7aeef1ac24eb6d85ff02ae2d29b117

#NCSAM: Third-Party Risk Management is Everyone’s Business

October 17, 2017 Added by:Scott Schneider

This post explores one of the weekly themes for National Cyber Security Awareness Month, “Cybersecurity in the Workplace is Everyone’s Business.”

Comments  (0)

Latest Posts

9e7aeef1ac24eb6d85ff02ae2d29b117

#NCSAM: Third-Party Risk Management is Everyone’s Business

October 17, 2017 Added by:Scott Schneider

This post explores one of the weekly themes for National Cyber Security Awareness Month, “Cybersecurity in the Workplace is Everyone’s Business.”

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update

October 17, 2017 Added by:James E. Lee

In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.

Comments  (0)

F3828ca8c8a9ac7e4fc6a5cc12f52066

Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification

October 13, 2017 Added by:Bogdan Botezatu

Fileless malware is completely different than file-based malware in terms of how the malicious code is executed and how it dodges traditional file-scanning technologies.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Why Cloud Security Is a Shared Responsibility

October 13, 2017 Added by:Sanjay Kalra

If you’re about to join the cloud revolution, start by answering these questions: how are security responsibilities shared between clients and cloud vendors? And why do on-premises security solutions fail in the cloud?

Comments  (0)

74a3faa048e151b7a9b61267399d79e3

Put Your S3 Buckets to the Test to Ensure Cloud Fitness

October 13, 2017 Added by:Tim Prendergast

Security measures that are critical to attain the basic level of security for your S3 buckets, which are always going to be a target because they store sensitive data.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Is Your “Father’s IAM” Putting You at Risk?

October 13, 2017 Added by:Jackson Shaw

Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and that you can prove that all the access is right.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – October 2017

October 13, 2017 Added by:Alexander Polyakov

The October 2017 set of SAP Security Notes consists of 30 patches with the majority of them rated medium.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

Cyber Security in the Workplace Is Everyone’s Obligation

October 11, 2017 Added by:Joseph Carson

Cyber security is no longer just a technology challenge—it’s a test for everybody who uses and interacts with technology daily. That means: everyone in your organization.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Hackers Disrupt Etherparty’s FUEL Token ICO

October 04, 2017 Added by:Ionut Arghire

Vancouver-based Etherparty on Sunday was forced to shut down its website after hackers managed to hijack its ICO (Initial Coin Offering) less than one hour after the launch.

Comments  (0)