Latest Posts


BankBot Spreads via Utility Apps in Google Play

September 18, 2017 Added by:Ionut Arghire

Several utility applications distributed through Google Play have been infected with the BankBot Android banking Trojan, TrendMicro reports.

Comments  (0)


How to Fail Safe Your Data in the Cloud or When It’s Shared with 3rd Parties

September 12, 2017 Added by:Min-Hank Ho

Whether ephemerally or permanently, data will be shared with 3rd parties and/or stored in the cloud.

Comments  (0)


No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)


How Secure Are Your Company’s Social Accounts?

September 07, 2017 Added by:Jackson Shaw

It’s really time to start protecting your Facebook, LinkedIn, Twitter, Tumblr, Instagram and all other social media systems with as much security as your accounts payable or human resources system.

Comments  (0)


Enterprise Security in the Age of Advanced Threats

September 05, 2017 Added by:Eric Polet

What does an advanced cyber-security solution need to look like for enterprises in 2018 and beyond?

Comments  (0)


Security Awareness: Watch-Out for Hurricane Harvey Online Scams

August 28, 2017 Added by:Dan Lohrmann

As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...

Comments  (0)


Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)


NIST Offering Much Needed Guidance for Neglected SMBs

August 11, 2017 Added by:Avi Bartov

The NIST framework provides the much-needed guidance that organizations of any size can use to identify their major risks in cyberspace.

Comments  (0)


What Is Hypervisor-based Security and Why Is It Important in Stopping Zero-Day Exploits?

August 11, 2017 Added by:Bogdan Botezatu

Utilizing the hypervisor for security measures is a crucial paradigm shift, as the number of techniques for utilizing exploits remains very small.

Comments  (0)


SAP Cyber Threat Intelligence Report – August 2017

August 11, 2017 Added by:Alexander Polyakov

The August 2017 set of SAP Security Notes consists of 19 patches with the majority of them rated medium.

Comments  (0)


Evasive Malware on the Rise: Time to Stop Stealth Attacks in their Tracks

August 11, 2017 Added by:Eddy Bobritsky

We need to develop and implement creative solutions that are broadly effective at turning “easy target” endpoints into dead ends for hackers and their tricks.

Comments  (0)


Enterprises: Can You Handle 3,680 Phishing Emails per Week?

August 08, 2017 Added by:Kevin O'Brien

As the number of Business Email Compromise scams continues to grow, understanding whether a specific message is an attack requires fully integrated threat intelligence.

Comments  (0)


Is Your Data at Risk Due to Third-Party Cloud Applications?

August 02, 2017 Added by:Scott Schneider

A simple mistake in one security setting can jeopardize the personal information of your customers. The costs of such carelessness are regulatory fines, a damaged reputation and a possible lawsuit.

Comments  (0)


How to Choose the Right Data Protection Strategy

August 02, 2017 Added by:Dave Packer

A deep dive on data protection solutions and how they fit unique needs.

Comments  (0)


Understanding Hacker Mindset Key for Website Security, Business Resilience

August 01, 2017 Added by:Avi Bartov

The traditional perimeter solutions are losing their effectiveness since hackers place more value in motive opportunities than they ever have previously.

Comments  (0)


Why We Must Work Together to Support Our Cyber Start-ups

August 01, 2017 Added by:Bernard Parsons

With both the number and severity of cyber attacks only set to increase over the next few years, it is essential we do everything we can to support the next wave of homegrown cyber entrepreneurs, innovators and practitioners.

Comments  (0)


How Businesses Can Bolster Security and Stop Attacks Before they Happen

August 01, 2017 Added by:Chris Schueler

Organizations will have to realize that in-house efforts often won’t be enough when fighting off hackers with attacks they’ve sourced from around the world.

Comments  (0)


Identifying and Patching Vulnerabilities in a Post-Microsoft Security Bulletin World

July 27, 2017 Added by:Ken Hilker

Last November Microsoft warned that the Security Bulletins on Patch Tuesday would be discontinued, and they followed through on their promise with the April 2017 edition

Comments  (0)


How Does UC in the Cloud Impact Your Security Posture?

July 20, 2017 Added by:Myk Konrad

To maintain the security posture of unified communications, enterprises must implement a holistic approach to security that extends from their infrastructure to the cloud.

Comments  (0)


How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)