Latest Posts

5c34159020b03e81c9ae7077282a2bd4

WannaCry and Jaff: Two Different Malware Attacks with A Common Goal

June 02, 2017 Added by:Sean Tierney

On Friday, May 12, two separate ransomware attacks were unfolding, each both using different distribution capabilities and malware.

Comments  (0)

F21d07d4419b469fe0208b4a77f56c7b

Malware: The Gift That Keeps on Giving

June 02, 2017 Added by:Topher Tebow

Always be wary of unfamiliar USB devices, you never know what might be lurking in the darkness.

Comments  (0)

E54bce6ca0fef52e62d84b5ccedb4428

The Cyber Car: The Intimate Tango of the 21st Century

May 25, 2017 Added by:Asaf Atzmon

The automotive industry is now at a point of no return. Cyber is here to stay and the industry is very well aware of the vulnerability of connected cars.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Adylkuzz: WannaCry’s Older and More Devious Cousin

May 25, 2017 Added by:Kevin Magee

You might be immune to infection by WannaCry because you've already been infected by Adylkuzz.

Comments  (0)

B69b826e233a1abe465921e0e2180fae

Cloud Control: Key Points to Consider When Going to the Cloud

May 24, 2017 Added by:Eric Polet

Establishing a solid plan when deciding to transition to the cloud is essential. By understanding the costs to store, transfer, and retrieve data, organizations can protect themselves from making a costly mistake.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

WannaCry Shows World the Need for Endpoint Security

May 24, 2017 Added by:Amir Geri

Ransomware attacks will continue to become more sophisticated and effective as the year goes on. It is now imperative that organizations prepare their networks and devices for a ransomware attack.

Comments  (0)

4d0ac884f6fdb0c44f281653697aa2cc

The Administrative Credentials Security Hole

May 24, 2017 Added by:Chris Stoneff

Here’s the problem: the existence of administrative credentials stored on machines throughout the network.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Reducing Identity-related Risks: The Complete Package or a One-Man Show?

May 24, 2017 Added by:Jackson Shaw

Cybersecurity professionals are increasingly buckling down on identity and access management (IAM) to protect their critical data assets.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Live Webinar: Combining Pen Testing & Incident Detection

May 16, 2017 Added by:Mike Lennon

Join SecurityWeek and Rapid7's Eric Sun for actionable takeaways from penetration testing engagements, and see how customers are combining detection technologies to find intruders earlier in the attack chain.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – May 2017

May 12, 2017 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for May 2017. This update includes 17 SAP Notes.

Comments  (0)

5ad5c9808e863169a36cd3b7c535d72b

Convenience vs. Control: Achieving the Right Security Balance

May 12, 2017 Added by:Kevin Cunningham

By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.

Comments  (0)

F91acd8d7037a996f8343c9b924b3f5d

The Enterprise IoT Security Checklist for Today - and Tomorrow

May 10, 2017 Added by:Zachary Crockett

Here's a list of components of an IoT system that must be reviewed for possible vulnerabilities.

Comments  (0)

21a45a9d0545830392fdf2b51c4d8c54

GDPR: Ignore It at Your Own Risk

May 09, 2017 Added by:Tomáš Honzák

The GDPR will change business as we know it, and the best we can do is make sure we’re prepared.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

May 09, 2017 Added by:Scott Schneider

Bad guys will continue to prey upon the path of least resistance - third parties. It’s up to you to ensure your organization takes a comprehensive and risk based approach - rather than focusing solely on compliance.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Cloud-Based Access Governance: Organizational Continuity Achieved

May 09, 2017 Added by:Dean Wiech

Cloud-based access governance can pull up a portal listing your web-based applications, whether they are hosted in the cloud or running locally within the organization, and can authenticate in the network.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

To Tackle IoT Security’s Murky Future, We Need Only to Look to the Past

May 05, 2017 Added by:Sean Tierney

To build secure IoT devices today, companies new and old should consider textbook security fundamentals that have been set by companies making networked devices for the past few decades.

Comments  (0)

B2469d3b365f73d091fac06f227950e2

When Is Apple.com Not Apple.com? Faked Punycode Domains Running Rampant

May 01, 2017 Added by:Magni R. Sigurdsson

We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

SWIFT Attacks are Evolving - Is Your Segmentation Strategy?

April 28, 2017 Added by:Jesse McKenna

As we continue to see attacks levied against banking and payment applications, the need for fine-grained visibility and control over all aspects of communication between system components will only rise.

Comments  (0)

A5f2aa8b34c3021fca4738cd12cbd323

We Can’t Control Devices and People, but We Can Control the Network

April 26, 2017 Added by:Dennis Reilly

Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.

Comments  (0)

E14ebc073505fd5a94f8c16d9be81ec2

Smart Cities Must Be Secure Cities

April 14, 2017 Added by:Jack Huffard

The time spent to get the security of smart cities right out of the gate will save taxpayers significant sums in the future by not having to compensate for security issues later.

Comments  (0)