Enterprise Security

A4c42684a8889958a83ecca5d2fe59e5

The Soaring Success of Cybercrime as a Company

March 22, 2018 Added by:A. N. Ananth

In a raging cyber war, it pays to think like cybercriminals and understand how they are organizing and operating as corporations. While enterprises won’t resort to cybercrime, we need to understand, outthink and outplay our adversaries at a strategic, not just tactical, level.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

A Siri for Network Security: How Chatbots Can Enhance Business Agility

March 19, 2018 Added by:Avishai Wool

Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Beat Them at Their Own Game: Understanding and Neutralizing Evasive Malware Tactics in the Face of Rising Attacks

March 16, 2018 Added by:Eddy Bobritsky

If there is any hope of disarming modern and well-equipped attackers, we have to beat them at their game.

Comments  (0)

2d356835f3abb8f341fe23f58a2b4fd6

Increasing Board Accountability and Expertise Is Critical to Security and Risk Management

March 09, 2018 Added by:Greg Reber

The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.

Comments  (0)

Fcd5ebcc1f75461bbe843246f54c190e

Today's Threat Landscape Demands User Monitoring

February 27, 2018 Added by:Eric Sun

For a complete picture of user behavior, you need visibility both on and off the corporate network.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

EDR for Everyone Is about Fighting Alert Fatigue

February 21, 2018 Added by:Liviu Arsene

Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics

February 16, 2018 Added by:Ben Carr

Start planning now for the events on the horizon; hopefully you thought ahead for Pyeongchang – but remember Tokyo 2020 isn’t that far way.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – February 2018

February 16, 2018 Added by:Alexander Polyakov

The second set of SAP Security Notes in 2018 consists of 26 patches with the majority of them rated medium.

Comments  (0)

377a54ee089b6809e8e68d75d28614cb

Think GDPR Won’t Affect Your U.S. Company? Guess Again

February 07, 2018 Added by:Ken Spinner

Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Crypto-Mining Is the Next Ransomware

January 19, 2018 Added by:Steve McGregory

Since new security threats surface every week, there is a good chance that more devices will be infected with cryptocurrency mining malware in the near future.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

86e0caefdf114afad6827dea09ba79c6

What Global Manufacturers Need to Know About Security in the Cloud

January 08, 2018 Added by:Srivats Ramaswami

Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.

Comments  (0)

2b8841bdc3ceab2b637f4594ef21d2aa

Hackers Wreak Havoc in 2017, is 2018 Ready to Battle?

January 04, 2018 Added by:Martin McKeay

If 2017 taught us anything, it’s that we have a long way to go to get ahead of adversaries. The biggest impact a security team can make in the new year is to understand how effectiveness of their protections are against the evolving threats.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats You Need to Know About in 2018

January 03, 2018 Added by:Steve Durbin

In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »