Latest Posts

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part Two — Best Practices

March 02, 2017 Added by:Logan Kipp

By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Security Policies Matter for Disaster Recovery

March 02, 2017 Added by:Avishai Wool

Prevention is no longer enough to ensure robust readiness to unplanned incidents and cyber threats. Organizations also need to ensure that their incident response is as slick and unified as possible.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part One — Anatomy of WordPress

March 01, 2017 Added by:Logan Kipp

Part One of #AskSecPro is an introduction to some of the infrastructure behind WordPress.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Access Management and the Automation of Things

February 21, 2017 Added by:Dean Wiech

Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – February 2017

February 17, 2017 Added by:Alexander Polyakov

SAP's February set of Security Notes consist of 22 patches, most of them fix missing authorization check vulnerabilities.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DigitalOcean Launches Public Bug Bounty Program

February 17, 2017 Added by:Ionut Arghire

Cloud computing platform DigitalOcean announced the public availability of its bug bounty program, after successfully running it in private mode.

Comments  (0)

A7a839ae03fd6cee0c4b6b7ff67127e9

What bicycle thefts can teach us about mobile security

February 17, 2017 Added by:Avi Rosen

Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)

33e341295f31dc98f191961ddd26bcba

When Ransomware Strikes: Does Your Company Have a Data Disaster Recovery Plan?

February 16, 2017 Added by:Jeff Erramouspe

Ransomware is rampant and those who commit the attacks aren’t discriminating against any industry, company size, or company location.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DynA-Crypt Ransomware Steals and Deletes User Data

February 11, 2017 Added by:Ionut Arghire

A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers warn.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Managing External Connectivity to and From Your Network: Do’s & Don’ts

February 07, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, explains how external connections to partner networks should be managed to maximize security and efficiency

Comments  (0)

306708aaf995cf6a77d3083885b60907

2017 Singapore ICS Cyber Security Conference Call for Papers is Open! (APAC)

February 01, 2017 Added by:Mike Lennon

The official Call for Papers (presentations) for SecurityWeek's 2017 Singapore Industrial Control Systems (ICS) Cyber Security Conference, being held April 25–27 at the Fairmont Singapore is now open.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Android Trojan Downloads Google Play Apps onto SD Cards

February 01, 2017 Added by:Ionut Arghire

A newly discovered Android Trojan can download applications from Google Play, but saves them onto the SD card instead of installing them, to keep this malicious activity hidden from the user.

Comments  (0)

Fa053a3185c9b7154992fb4bffe11e76

FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

New Year’s Resolution 2017: Build Better Security Programs

January 30, 2017 Added by:Steve Durbin

Enterprise risk management must build on a foundation of preparedness to create risk resilience by evaluating threat vectors from a position of business acceptability and risk profiling.

Comments  (0)

C66e591693fd6e7b26fc5a60efb68817

Alan Turing, Undecidable Problems, and Malware

January 23, 2017 Added by:Kenneth Geers

In order to keep workers happy and productivity high, sometimes you have to run untrusted code. But that code should be run in quarantine, where it cannot damage your IT infrastructure.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

The Forgotten Security Frontier: The Phone Call

January 23, 2017 Added by:Myk Konrad

The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – January 2017

January 13, 2017 Added by:Alexander Polyakov

SAP's first set of SAP Security Notes for 2017 includes 23 security patches, one considered Hot News (assessed 9.8 by CVSS base score v.3.0).

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Neutrino Bot Distributed in Post-Holiday Spam Run

January 12, 2017 Added by:Ionut Arghire

A spam distribution campaign spotted just after the holiday season has ended is distributing the Neutrino Bot via a linked malicious Office document, Malwarebytes Labs security researchers warn.

Comments  (0)