Latest Posts

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – April 2018

April 19, 2018 Added by:Alexander Polyakov

The April 2018 set of SAP Security Notes consists of 16 patches with the majority of them rated medium.

Comments  (0)

D984d097fe7d91c5f11b79f9877ed9bc

Cloud Security Alert – Log Files Are Not the Answer

April 18, 2018 Added by:Lora O'Haver

Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Avoiding Holes in Your AWS Buckets

April 12, 2018 Added by:Sanjay Kalra

Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.

Comments  (0)

809e5bf42b3c61540fdf08a772a9d960

The Three Great Threats to Modern Civilization

April 12, 2018 Added by:Jessica Lavery

There are three main threats to our modern civilization that could cause humanity to go the way of the ancient Mayans.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

2020 Vision: How to Prepare for the Future of Information Security Threats

April 06, 2018 Added by:Steve Durbin

A highlight of the top nine threats to information security over the next two years.

Comments  (0)

1a097da944042b7ffb4af15523c405ba

Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus

April 03, 2018 Added by:Mike McKee

DLP appears to be following in the footsteps of another once-ubiquitous but now outdated technology: anti-virus.

Comments  (0)

3cf030edb83351856102235bcee85613

Unconventional Thinking — Four Practices to Help Mitigate Risk

April 02, 2018 Added by:Sanjay Ramnath

Organizations must proactively assess their security posture and focus on mitigating risk with unconventional approaches to achieve true security and reduction of successful cyber events.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

The Night the Lights Went out in Georgia (Almost)

March 29, 2018 Added by:Ben Carr

The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.

Comments  (0)

E8643ec2aea49d246d020cf412aa5d05

Is Blockchain Really Disruptive in Terms of Data Security?

March 26, 2018 Added by:Mary Callahan

Blockchain can provide transparency, decentralization, efficiency, security, and other benefits, revolutionizing multiple industries.

Comments  (0)

F93757731f02bb253ed824020ef2cf6e

Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed

March 26, 2018 Added by:David Pearson

Context is everything: connecting the dots between indicators of interesting activity across different aspects of an environment is the way to provide unparalleled alert fidelity.

Comments  (0)