Latest Blog Posts

6a1fbf6a6315721b9e8931e69112c21e

SOC Automation: Good or Evil?

May 24, 2018 Added by:John Moran

The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.

Comments  (0)

041c3f1348bafada6586f01a609f51df

Can Organisations Turn Back Time after a Cyber-Attack?

May 23, 2018 Added by:Patrice Puichaud

With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

The AWS Bucket List for Security

May 23, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder at AlgoSec, looks at how organizations can ensure network security is extended to AWS environments

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

Achieving Effective Application Security in a Cloud Generation

May 16, 2018 Added by:Jonathan Bregman

Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding the Role of Multi-Stage Detection in a Layered Defense

May 08, 2018 Added by:Liviu Arsene

It’s important to understand that the increased sophistication of threats requires security technologies capable of covering multiple stages of attack.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

VirusTotal Browser Extension Now Firefox Quantum-Compatible

May 05, 2018 Added by:Ionut Arghire

VirusTotal released an updated VTZilla browser extension this week to offer support for Firefox Quantum, the new and improved Web browser from Mozilla.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

PyRoMine Malware Sets Security Industry on Fire

May 03, 2018 Added by:Boris Vaynberg

Despite all the investments in cyber protection and prevention technology, it seems that the cyber terrorist’s best tool is nothing more than variations on previous exploits.

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

GDPR Is Coming. Is Your Organization Ready?

May 01, 2018 Added by:Mark Baldwin

The General Data Protection Regulation (GDPR) that goes into effect on May 25 affects any business that processes information of any EU citizen, regardless of whether the business is located in or has operations in the EU.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – April 2018

April 19, 2018 Added by:Alexander Polyakov

The April 2018 set of SAP Security Notes consists of 16 patches with the majority of them rated medium.

Comments  (0)

D984d097fe7d91c5f11b79f9877ed9bc

Cloud Security Alert – Log Files Are Not the Answer

April 18, 2018 Added by:Lora O'Haver

Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Avoiding Holes in Your AWS Buckets

April 12, 2018 Added by:Sanjay Kalra

Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.

Comments  (0)

809e5bf42b3c61540fdf08a772a9d960

The Three Great Threats to Modern Civilization

April 12, 2018 Added by:Jessica Lavery

There are three main threats to our modern civilization that could cause humanity to go the way of the ancient Mayans.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

2020 Vision: How to Prepare for the Future of Information Security Threats

April 06, 2018 Added by:Steve Durbin

A highlight of the top nine threats to information security over the next two years.

Comments  (0)

1a097da944042b7ffb4af15523c405ba

Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus

April 03, 2018 Added by:Mike McKee

DLP appears to be following in the footsteps of another once-ubiquitous but now outdated technology: anti-virus.

Comments  (0)

3cf030edb83351856102235bcee85613

Unconventional Thinking — Four Practices to Help Mitigate Risk

April 02, 2018 Added by:Sanjay Ramnath

Organizations must proactively assess their security posture and focus on mitigating risk with unconventional approaches to achieve true security and reduction of successful cyber events.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

The Night the Lights Went out in Georgia (Almost)

March 29, 2018 Added by:Ben Carr

The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »