Enterprise Security

9375e58c8325b652f623d22b5e9fda3f

Most SMBs Fold after Cyber Attacks: Here’s How to Protect Yours

October 12, 2018 Added by:Arun Gandhi

Perpetrators specifically target smaller, more vulnerable businesses because of their lack of security expertise and fragile infrastructure.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Lessons from Cyber Essentials – Going Back to the Basics

October 11, 2018 Added by:Andrew Avanessian

IT leaders across all organisations should be working to weave in the Cyber Essentials scheme into the fabric of their businesses.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Security Gets Messy: Emerging Challenges from Biometrics, New Regulations, Insiders

October 11, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

8bfed574fad1aecf3a4606bdac0e82f8

NIST and the Small Business: Addressing Cyber Insecurity

October 09, 2018 Added by:Baan Alsinawi

In August, President Trump signed the NIST Small Business Cybersecurity Act.

Comments  (0)

F9b46f5646b843bd0f87903611d30aad

Ransomware: Keep Safe and Stay Safe

October 09, 2018 Added by:Richard Hummel

Ransomware may not be the threat it once was, but it still poses a risk to the files and systems of businesses everywhere.

Comments  (0)

1a097da944042b7ffb4af15523c405ba

Embracing Cybersecurity Best Practices, No Matter Where You Are

October 05, 2018 Added by:Mike McKee

Much like your physical health, there is no way to guarantee cyber health.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

6 Ways to Use CloudTrail to Improve AWS Security

October 02, 2018 Added by:Sanjay Kalra

Managing security in Amazon Web Services (AWS) is not a set-it-and-forget-it type of proposition.

Comments  (0)

6a1fbf6a6315721b9e8931e69112c21e

Variations in State Data Breach Disclosure Laws Complicate Compliance

September 26, 2018 Added by:John Moran

New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

What Exactly is Threat Hunting - and Why Does it Matter?

September 24, 2018 Added by:Troy Kent

Though there is debate over the various attributes that make up threat hunting, every SOC has the potential to engage in some level of hunting – and taking action is what’s truly important.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

It's Time to Get Real about Complex, Emerging Threats

September 12, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge

September 12, 2018 Added by:Liviu Arsene

Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.

Comments  (0)

130c36bd4e626734d3c3de4e43cdbb8c

Busting the VDI Security Myth

September 11, 2018 Added by:Tal Zamir

Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Why Admin Rights Removal Is only the First Step towards Data Protection

September 11, 2018 Added by:Andrew Avanessian

Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.

Comments  (0)

8d109f28623b3d0bd57500ba35f914e1

Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care?

September 06, 2018 Added by:Rishi Bhargava

SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action.

Comments  (0)

D5cad47c94727a4c525129559ae89d17

CVE-2018-11776 — The Latest Apache Struts Vulnerability

September 04, 2018 Added by:Fred Bals

A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The Importance and Requirements of Privileged Access Management

August 30, 2018 Added by:Joseph Carson

The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »