August 23, 2016 Added by:Mike Paquette
Not all security analytics solutions are created equal. There are five key characteristics critically important to ensuring that your security analytics are effective and capable of stopping today’s advanced threats.
August 18, 2016 Added by:Michael Patterson
Attackers are going to get in and you will be required to perform incident response. The first thing the security team will ask for is the logs. Make sure logs are backed up to a 2nd system or 3rd system and make sure a UDP forwarder is relaying the messages.
August 18, 2016 Added by:Scott Gordon
Next generation F-DRM solutions offer an effective and flexible technical control that can be applied today to reduce file data leakage risks across different infrastructure, collaboration methods, user types and business requirements.
August 17, 2016 Added by:Johannes Lintzen
An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles.
August 17, 2016 Added by:Dean Wiech
Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits.
August 12, 2016 Added by:Peter Tsai
Big sporting events like the Olympic Games capture the hearts and attention of billions around the world. But how can companies avoid streaming agony and get high marks for network performance during live events? Here are tips straight from IT professionals.
August 11, 2016 Added by:Avishai Wool
Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.
August 11, 2016 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for August 2016. This patch update closes 30 vulnerabilities in SAP products including 26 SAP Security Patch Day Notes and 4 Support Package Notes.
August 11, 2016 Added by:Gavin Siggers
The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.
August 11, 2016 Added by:Karl Sigler
Exploit kits are increasingly using the evil twin of an advertisement, a malvertisement, as a gateway to a web browser.
August 11, 2016 Added by:Joe Levy
Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.
August 05, 2016 Added by:Ionut Arghire
Hackers managed to compromise FossHub and replace app installers distributed through it with malware-packed files, but not before hundreds of users downloaded the infected executables.
August 03, 2016 Added by:Mark Carrizosa
Three industry influencers identify trends and priorities and discuss what they are doing within their own organizations to mitigate third-party risk.
July 27, 2016 Added by:Dan Lohrmann
The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content.
July 27, 2016 Added by:Slawek Ligier
There is certainly no shortage of cyber-attacks in the headlines, and none more prevalent than ransomware attacks. These bold attacks encrypt user files, then demand a ransom in exchange for decrypting the files and restoring access to the original owner.
July 25, 2016 Added by:InfosecIsland News
SecurityWeek and Palo Alto Networks will host a live network security webinar on Wednesday, July 27th at 1:00PM ET: Five Steps to a Secure Hybrid Architecture.