Tag: What
-
What Is the Role of SIEM in the Fusion Center Era?
Despite what you may have heard, security information and event management (SIEM) is not dead. Rather, it’s become an integral part of …
-
What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?
To avoid malware, you should always get hardware and software from official, authorized and reputable sources and vendors, right? But what …
-
What hackers inside your company are after: Convenience
Employees have become convenience hackers, and often a policy they are ignoring, or a workaround to security technology that they’ve …
-
What is shadow mining and why is it a security threat?
The majority of organizations are overlooking the threat of shadow mining, with 65 percent of organizations unfamiliar with the term and …
-
What Is OVAL? A Community-Driven Vulnerability Management Brain!
The Open Vulnerability and Assessment Language (OVAL®) is a critical component of most enterprise’s endpoint cybersecurity operations. …
-
What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security
Single Sign-on is a method of authentication process that helps to log in multiple application using single login credentials. Security is …
-
RSA 2019 recap: What we learned
Every year, the RSA Conference grows in size, reflecting the ever-increasing prominence of the central topic it covers, cybersecurity. The …
-
Security Testing in the Cloud: What to Know?
Cloud computing allows us to access our email, documents, applications, and more from anywhere with an Internet connection. Everything that …
-
What Hacker History Can Tell Enterprises About Future Attack Strategy
There’s an oft-quoted saying: “History repeats itself.” For those that believe in the cyclical patterns that sometimes emerge over …
-
Here’s What You Need to Know to Secure Your IoT Projects
Recent statistics show that the security issues associated with internet of things (IoT) devices are on the rise. This is a direct …
-
What you can expect at the 10th annual HITB Security Conference in The Netherlands
The tenth edition of Hack In The Box Amsterdam will soon be upon us, with interesting talks, trainings, and hacking contests. Some of the …
●●●