Vulns & Alerts

71fd135c31a6d0bc64f3b46c190a4590

Who’s Responsible for Your Cyber-Security?

February 12, 2019 Added by:Matt Johnson

Cyber security is everybody’s responsibility – make sure that staff have the tools, and the knowledge, to do it properly.

Comments  (0)

368febea925e4f73f6df3d1fa3c8d577

Four Technologies that will Increase Cybersecurity Risk in 2019

January 17, 2019 Added by:Srinivas Mukkamala

While advances in technology provide many benefits, they also open new threat vectors and the potential for attacks that can spread quickly over connected ecosystems.

Comments  (0)

E35eb0b731ef951516e38fd155abfdf4

Strategies for Winning the Application Security Vulnerability Arms Race

January 17, 2019 Added by:Anna Chiang

Security and development teams need to collaborate closely to ensure that enterprise web and mobile applications are free of vulnerabilities that can lead to costly data breaches.

Comments  (0)

97dc236369e7b32f4b9281ae4382c2ee

Vote for Blockchain [Voting]

December 19, 2018 Added by:George Levy

The current voting system is ripe for change and blockchain will likely play a large role in the evolution of our electoral processes.

Comments  (0)

B62486f17abbb685a2012b729dc70376

What You Need to Know about the Recent Apache Struts Vulnerability

November 05, 2018 Added by:Tushar Richabadas

Researchers recently revealed a vulnerability in Apache Struts, a popular type of enterprise software. Active exploit attempts weren’t far behind.

Comments  (0)

6a1fbf6a6315721b9e8931e69112c21e

Variations in State Data Breach Disclosure Laws Complicate Compliance

September 26, 2018 Added by:John Moran

New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge

September 12, 2018 Added by:Liviu Arsene

Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.

Comments  (0)

130c36bd4e626734d3c3de4e43cdbb8c

Busting the VDI Security Myth

September 11, 2018 Added by:Tal Zamir

Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Why Admin Rights Removal Is only the First Step towards Data Protection

September 11, 2018 Added by:Andrew Avanessian

Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.

Comments  (0)

8d109f28623b3d0bd57500ba35f914e1

Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care?

September 06, 2018 Added by:Rishi Bhargava

SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action.

Comments  (0)

26104e7f12ca49e1208007765787726d

New Payment Tech, New Security Challenges

September 04, 2018 Added by:Simon Blake-Wilson

New apps and technologies present payment providers with new types of threats.

Comments  (0)

D5cad47c94727a4c525129559ae89d17

CVE-2018-11776 — The Latest Apache Struts Vulnerability

September 04, 2018 Added by:Fred Bals

A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework.

Comments  (0)

E51e95052d67c3df896465b1249e9432

Is User Training the Weakest Link for Your Email Security Approach?

June 28, 2018 Added by:Dennis Dillman

Security training and awareness should be at the top of your layered security strategy to ensure your employees are less of a liability, and the risk of a breach is significantly lower.

Comments  (0)

041c3f1348bafada6586f01a609f51df

Can Organisations Turn Back Time after a Cyber-Attack?

May 23, 2018 Added by:Patrice Puichaud

With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – April 2018

April 19, 2018 Added by:Alexander Polyakov

The April 2018 set of SAP Security Notes consists of 16 patches with the majority of them rated medium.

Comments  (0)

F7d0f3bd3db3ac1238b1165855b93542

The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking

February 09, 2018 Added by:Ross Rustici

Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked