Latest Blog Posts

21a45a9d0545830392fdf2b51c4d8c54

GDPR: Ignore It at Your Own Risk

May 09, 2017 Added by:Tomáš Honzák

The GDPR will change business as we know it, and the best we can do is make sure we’re prepared.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

May 09, 2017 Added by:Scott Schneider

Bad guys will continue to prey upon the path of least resistance - third parties. It’s up to you to ensure your organization takes a comprehensive and risk based approach - rather than focusing solely on compliance.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Cloud-Based Access Governance: Organizational Continuity Achieved

May 09, 2017 Added by:Dean Wiech

Cloud-based access governance can pull up a portal listing your web-based applications, whether they are hosted in the cloud or running locally within the organization, and can authenticate in the network.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

To Tackle IoT Security’s Murky Future, We Need Only to Look to the Past

May 05, 2017 Added by:Sean Tierney

To build secure IoT devices today, companies new and old should consider textbook security fundamentals that have been set by companies making networked devices for the past few decades.

Comments  (0)

B2469d3b365f73d091fac06f227950e2

When Is Apple.com Not Apple.com? Faked Punycode Domains Running Rampant

May 01, 2017 Added by:Magni R. Sigurdsson

We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

SWIFT Attacks are Evolving - Is Your Segmentation Strategy?

April 28, 2017 Added by:Jesse McKenna

As we continue to see attacks levied against banking and payment applications, the need for fine-grained visibility and control over all aspects of communication between system components will only rise.

Comments  (0)

A5f2aa8b34c3021fca4738cd12cbd323

We Can’t Control Devices and People, but We Can Control the Network

April 26, 2017 Added by:Dennis Reilly

Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.

Comments  (0)

E14ebc073505fd5a94f8c16d9be81ec2

Smart Cities Must Be Secure Cities

April 14, 2017 Added by:Jack Huffard

The time spent to get the security of smart cities right out of the gate will save taxpayers significant sums in the future by not having to compensate for security issues later.

Comments  (0)

C7dfecda6fd69655c7816096b371e9e4

Is Fileless Malware Really Fileless?

April 13, 2017 Added by:Travis Smith

It doesn’t matter how advanced your adversaries are, the simple defensive measures still matter.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

What Is Your Security Canary?

April 13, 2017 Added by:Jesse McKenna

Although traditional anti-malware approaches tend to focus on looking deep within each endpoint for suspicious activity, in the case of ransomware particularly, this equates to monitoring the coal miners and when an event happens, you’ve just lost a miner.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Pro: Encryption Explained

April 13, 2017 Added by:Logan Kipp

Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Plugging the Gaps in Your Incident Response

April 13, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, explains how two gaps may be holding back your incident response strategy – and how to fill them.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – April 2017

April 13, 2017 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for April 2017. This patch update includes 27 SAP Notes (17 SAP Security Patch Day Notes and 10 Support Package Notes).

Comments  (0)

7f2b2f3993942d8fffe0959b532816ea

Growing Risk In IoT & Mobile App Security

April 07, 2017 Added by:Mandeep Khera

IoT and mobile app security is at considerable risk, as confusion of who owns security within the development, testing and implementation process remains in question.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

Are Job Seekers at Risk of a Cyber Breach?

April 07, 2017 Added by:Amir Geri

Job seekers are regularly expected to input personal information about themselves to company and state databases, but it should be guaranteed that their information will remain secure.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence

April 06, 2017 Added by:Larry Karisny

The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »