Latest Posts

D36d0936f0c839be7bf2b20d59eaa76d

Security vs. Privacy: Securing Your Critical Information Assets

November 17, 2016 Added by:Steve Durbin

Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.

Comments  (0)

8abfe8ac9ec214d68541fcb888c0b4c3

Norton Cyber Security Insights Report - November 2016

November 17, 2016 Added by:Peter Buttler

A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – November 2016

November 14, 2016 Added by:Alexander Polyakov

SAP’s critical patch update for November contains 16 SAP Security Notes, two rated Hot News.

Comments  (0)

506b5559f05c479155e6e12f61e31c2d

Solving the Incompatibility Problem Between Smart Network Security and Swift Operations Efficiency

November 11, 2016 Added by:Jeff Hussey

By replacing traditional IP addresses with cryptographic identities (CID), comprehensive security is enabled at the device level, rather than reinforcing a vulnerable perimeter with outdated and largely ineffective measures.

Comments  (0)

A54b17daa55292c4d86ee62ac8a766b8

What We’re Learning about Ransomware, and How Security Is Stepping Up to the Task

November 08, 2016 Added by:Hatem Naguib

If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DOM XSS Vulnerability Impacts Over 70 Million Wix Websites

November 05, 2016 Added by:Ionut Arghire

A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – October 2016

October 20, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.

Comments  (0)

20913c01b73eb72bf3bbd8b570e4dfa4

Securing the Remedy Before the Breach

October 20, 2016 Added by:Eldar Tuvey

Businesses need to put strategic operations in place to ensure they can successfully move forward after a hack has taken place.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. Election Drives Increase in Malware and Spam

October 20, 2016 Added by:Ionut Arghire

The activity of malware and spam groups has intensified in the wake of United States presidential election, in an attempt to capitalize on the highly important upcoming event, Symantec warns.

Comments  (0)

2271632958e3e89d01a458efe5e003bd

Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27

October 18, 2016 Added by:Eduard Kovacs

Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Nitol Botnet Uses New Evasion Techniques

October 18, 2016 Added by:Ionut Arghire

The Nitol botnet was recently observed employing new evasion techniques in distribution attacks that leverage malicious macro-based documents, Netskope security researchers warn.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

33 Million Evony User Accounts Emerge Online

October 16, 2016 Added by:Ionut Arghire

Over 33 million accounts from online gaming platform Evony have emerged online after hackers reportedly gained access to the platform’s main database in June this year.

Comments  (0)

Ee5f058b283cdc6dba84464d453801d7

Closing the Cybersecurity Skills Gap — Calling All Women

October 12, 2016 Added by:Michelle Johnson Cobb

As cyberthreats have become more sophisticated, networks more complex and cybersecurity issues of greater concern at the board level, demand for skilled cybersecurity professionals has soared. Unfortunately, there just isn’t enough talent to fill all of the roles.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!

October 12, 2016 Added by:Vanishree Rao

While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cyber Resilience Remains Vital to Sustaining Brand Reputation

October 07, 2016 Added by:Steve Durbin

Organizations face a daunting array of challenges interconnected with cybersecurity: the insatiable appetite for speed and agility, the growing dependence on complex supply chains, and the rapid emergence of new technologies.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Demonstration of Destructive Cyberattack Vector on “Air-gapped” Systems

September 30, 2016 Added by:Joe Weiss

Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).

Comments  (0)

D28106e94004d3770212d3902fbf14d5

What It Will Really Take to Build Trust in Security Companies

September 28, 2016 Added by:Ori Eisen

If a company trusts their own product to not fail, the customer can too—with this level of trust ultimately reaching the average person. It’s a win-win-win.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Avoid the Breach: Live Webinar 9/27 - Register Now

September 26, 2016 Added by:InfosecIsland News

Please join Centrify and SecurityWeek for this live webinar on Tuesday, Sept. 27th at 1PM ET, when we will discuss guidance from the National Institute of Standards and Technology (NIST) along with best practices and regulation mandates.

Comments  (0)