Enterprise Security

0a36f423b9a230eb25d9f024fb71c03c

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

June 13, 2018 Added by:Guy Caspi

To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

The 3 Must Knows of Sandboxing

June 04, 2018 Added by:Boris Vaynberg

While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay.

Comments  (0)

Dfb05b2df86265de8900aa5aadd6d685

Infrastructure Under Attack

May 31, 2018 Added by:Tom Bienkowski

Any organization that delivers services over the web needs strong, purpose-built DDoS protection.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

How to Prevent Cloud Configuration Errors

May 29, 2018 Added by:Reuven Harrison

With unified visibility into the whole network, at all levels, IT managers will be able to strike a balance between security and functionality.

Comments  (0)

6a1fbf6a6315721b9e8931e69112c21e

SOC Automation: Good or Evil?

May 24, 2018 Added by:John Moran

The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.

Comments  (0)

041c3f1348bafada6586f01a609f51df

Can Organisations Turn Back Time after a Cyber-Attack?

May 23, 2018 Added by:Patrice Puichaud

With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

The AWS Bucket List for Security

May 23, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder at AlgoSec, looks at how organizations can ensure network security is extended to AWS environments

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding the Role of Multi-Stage Detection in a Layered Defense

May 08, 2018 Added by:Liviu Arsene

It’s important to understand that the increased sophistication of threats requires security technologies capable of covering multiple stages of attack.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – April 2018

April 19, 2018 Added by:Alexander Polyakov

The April 2018 set of SAP Security Notes consists of 16 patches with the majority of them rated medium.

Comments  (0)

D984d097fe7d91c5f11b79f9877ed9bc

Cloud Security Alert – Log Files Are Not the Answer

April 18, 2018 Added by:Lora O'Haver

Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Avoiding Holes in Your AWS Buckets

April 12, 2018 Added by:Sanjay Kalra

Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

2020 Vision: How to Prepare for the Future of Information Security Threats

April 06, 2018 Added by:Steve Durbin

A highlight of the top nine threats to information security over the next two years.

Comments  (0)

1a097da944042b7ffb4af15523c405ba

Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus

April 03, 2018 Added by:Mike McKee

DLP appears to be following in the footsteps of another once-ubiquitous but now outdated technology: anti-virus.

Comments  (0)

3cf030edb83351856102235bcee85613

Unconventional Thinking — Four Practices to Help Mitigate Risk

April 02, 2018 Added by:Sanjay Ramnath

Organizations must proactively assess their security posture and focus on mitigating risk with unconventional approaches to achieve true security and reduction of successful cyber events.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

The Night the Lights Went out in Georgia (Almost)

March 29, 2018 Added by:Ben Carr

The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.

Comments  (0)

F93757731f02bb253ed824020ef2cf6e

Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed

March 26, 2018 Added by:David Pearson

Context is everything: connecting the dots between indicators of interesting activity across different aspects of an environment is the way to provide unparalleled alert fidelity.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »