Key Takeaways: Using a Blacklist of Stolen Passwords [Webinar]

More than 90 billion passwords are being used across the web today, and it’s expected to be nearer 300 billion by 2020. With that in mind, the topics of password best practices and the threats around stolen credentials, remain top challenges for … Continue reading Key Takeaways: Using a Blacklist of Stolen Passwords [Webinar]

Revisiting the Top Security Threats of 2017

Many of the security threats we noted at the start of 2017 gripped the public’s attention during the past year, foreshadowing major shifts to come in 2018.

The post Revisiting the Top Security Threats of 2017 appeared first on Security Intelligence.

Continue reading Revisiting the Top Security Threats of 2017

Top Cybersecurity Trends for the First Half of 2017

Many of the most notable cybersecurity trends of the first half of 2017, such as the rapid evolution of malware techniques, will continue through the year.

The post Top Cybersecurity Trends for the First Half of 2017 appeared first on Security Intelligence.

Continue reading Top Cybersecurity Trends for the First Half of 2017

Current Trends in Identity and Access Management: July 2017

At the midpoint of 2017, five trends are emerging in the identity and access management, and with these waves comes an opportunity for security teams.

The post Current Trends in Identity and Access Management: July 2017 appeared first on Security Intelligence.

Continue reading Current Trends in Identity and Access Management: July 2017

SAP HANA Security Evolution, From SPS08 to Now

The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.

The post SAP HANA Security Evolution, From SPS08 to Now appeared first on Security Intelligence.

Continue reading SAP HANA Security Evolution, From SPS08 to Now