Latest Posts

C7dfecda6fd69655c7816096b371e9e4

Is Fileless Malware Really Fileless?

April 13, 2017 Added by:Travis Smith

It doesn’t matter how advanced your adversaries are, the simple defensive measures still matter.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

What Is Your Security Canary?

April 13, 2017 Added by:Jesse McKenna

Although traditional anti-malware approaches tend to focus on looking deep within each endpoint for suspicious activity, in the case of ransomware particularly, this equates to monitoring the coal miners and when an event happens, you’ve just lost a miner.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Pro: Encryption Explained

April 13, 2017 Added by:Logan Kipp

Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Plugging the Gaps in Your Incident Response

April 13, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, explains how two gaps may be holding back your incident response strategy – and how to fill them.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – April 2017

April 13, 2017 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for April 2017. This patch update includes 27 SAP Notes (17 SAP Security Patch Day Notes and 10 Support Package Notes).

Comments  (0)

7f2b2f3993942d8fffe0959b532816ea

Growing Risk In IoT & Mobile App Security

April 07, 2017 Added by:Mandeep Khera

IoT and mobile app security is at considerable risk, as confusion of who owns security within the development, testing and implementation process remains in question.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

Are Job Seekers at Risk of a Cyber Breach?

April 07, 2017 Added by:Amir Geri

Job seekers are regularly expected to input personal information about themselves to company and state databases, but it should be guaranteed that their information will remain secure.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence

April 06, 2017 Added by:Larry Karisny

The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.

Comments  (0)

C33ba283f54a267b479325c67e2ea466

4 Things that Make Cloud Compliance Harder Than You Think

April 06, 2017 Added by:John Martinez

There are some factors to take into consideration that may make compliance in the cloud a bit more challenging

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Bracing for the Future of Information Security Threats

April 04, 2017 Added by:Steve Durbin

New attacks will impact both business reputation and shareholder value, and cyber risk exists in every aspect of the enterprise. Here are the top nine threats to information security over the next two years.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Stop Doing Four Things—and Convince Your Execs and Board to Properly Fund Cybersecurity

March 28, 2017 Added by:Kevin Magee

If you want to convince your execs and board to properly fund cybersecurity, stop telling them scary stories and using Hollywood clichés to make your case.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webinar: How to Use Good, Actionable Threat Intelligence

March 21, 2017 Added by:InfosecIsland News

Join F5 Networks and SecurityWeek for this interactive webinar on March 22nd at 1PM ET, to learn what good, actionable threat intelligence looks like, and how to effectively use it to neutralize potential attacks before they strike.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Malvertising and Exploit Kits Still a Significant Threat: FireEye

March 18, 2017 Added by:InfosecIsland News

Malicious online ads and the exploit kits (EK) used to infect computers with various types of malware continue to pose a significant threat, FireEye warns.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – March 2017

March 17, 2017 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for March 2017. This patch update includes 35 SAP Notes (28 SAP Security Patch Day Notes and 7 Support Package Notes).

Comments  (0)

D39e8a0d81c2a146f879631550fb065b

GRC: Going Beyond the Acronym

March 10, 2017 Added by:Corey Wilburn

An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.

Comments  (0)

9426edcb04ba15a57df6d674f1c74db9

Why Is Digital Property Monitored Less than Physical Property?

March 09, 2017 Added by:Ajit Singh

If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past

March 09, 2017 Added by:Scott Schneider

Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Neutrino Bot Gets Protective Loader

March 07, 2017 Added by:Ionut Arghire

A recently observed variant of the multi-purpose Neutrino Bot is using a protective, obfuscated loader that is an integral part of the full package.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part Two — Best Practices

March 02, 2017 Added by:Logan Kipp

By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Security Policies Matter for Disaster Recovery

March 02, 2017 Added by:Avishai Wool

Prevention is no longer enough to ensure robust readiness to unplanned incidents and cyber threats. Organizations also need to ensure that their incident response is as slick and unified as possible.

Comments  (0)