Enterprise Security
SAP Cyber Threat Intelligence Report – April 2018
April 19, 2018 Added by:Alexander Polyakov
The April 2018 set of SAP Security Notes consists of 16 patches with the majority of them rated medium.
Comments (0)
Cloud Security Alert – Log Files Are Not the Answer
April 18, 2018 Added by:Lora O'Haver
Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.
Comments (0)
Avoiding Holes in Your AWS Buckets
April 12, 2018 Added by:Sanjay Kalra
Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.
Comments (0)
2020 Vision: How to Prepare for the Future of Information Security Threats
April 06, 2018 Added by:Steve Durbin
A highlight of the top nine threats to information security over the next two years.
Comments (0)
Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus
April 03, 2018 Added by:Mike McKee
DLP appears to be following in the footsteps of another once-ubiquitous but now outdated technology: anti-virus.
Comments (0)
Unconventional Thinking — Four Practices to Help Mitigate Risk
April 02, 2018 Added by:Sanjay Ramnath
Organizations must proactively assess their security posture and focus on mitigating risk with unconventional approaches to achieve true security and reduction of successful cyber events.
Comments (0)
The Night the Lights Went out in Georgia (Almost)
March 29, 2018 Added by:Ben Carr
The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.
Comments (0)
Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed
March 26, 2018 Added by:David Pearson
Context is everything: connecting the dots between indicators of interesting activity across different aspects of an environment is the way to provide unparalleled alert fidelity.
Comments (0)
4 Ways Every Employee Can Play a Role in Their Company’s Security
March 23, 2018 Added by:Tomáš Honzák
Employees can help a company avoid catastrophic data breaches and protect their own personal data more effectively.
Comments (0)
The Soaring Success of Cybercrime as a Company
March 22, 2018 Added by:A. N. Ananth
In a raging cyber war, it pays to think like cybercriminals and understand how they are organizing and operating as corporations. While enterprises won’t resort to cybercrime, we need to understand, outthink and outplay our adversaries at a strategic, not just tactical, level.
Comments (0)
A Siri for Network Security: How Chatbots Can Enhance Business Agility
March 19, 2018 Added by:Avishai Wool
Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring
Comments (0)
Centering Your Security Strategy on Leadership, Resilience and Fundamentals
March 16, 2018 Added by:Steve Durbin
Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.
Comments (0)
Beat Them at Their Own Game: Understanding and Neutralizing Evasive Malware Tactics in the Face of Rising Attacks
March 16, 2018 Added by:Eddy Bobritsky
If there is any hope of disarming modern and well-equipped attackers, we have to beat them at their game.
Comments (0)
Increasing Board Accountability and Expertise Is Critical to Security and Risk Management
March 09, 2018 Added by:Greg Reber
The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.
Comments (0)
Today's Threat Landscape Demands User Monitoring
February 27, 2018 Added by:Eric Sun
For a complete picture of user behavior, you need visibility both on and off the corporate network.
Comments (0)
EDR for Everyone Is about Fighting Alert Fatigue
February 21, 2018 Added by:Liviu Arsene
Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.
Comments (0)
- SAP Cyber Threat Intelligence Report – April 2018
- Cloud Security Alert – Log Files Are Not the Answer
- Avoiding Holes in Your AWS Buckets
- The Three Great Threats to Modern Civilization
- 2020 Vision: How to Prepare for the Future of Information Security Threats
- Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus
- Unconventional Thinking — Four Practices to Help Mitigate Risk
- The Night the Lights Went out in Georgia (Almost)
- Is Blockchain Really Disruptive in Terms of Data Security?
- Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed