Uncovering Risk From SAP HANA Vulnerabilities Can Be Simple and Easy

Vulnerabilities in a SAP HANA system can result in major consequences for users, but identifying and remediating these issues can be easy.

The post Uncovering Risk From SAP HANA Vulnerabilities Can Be Simple and Easy appeared first on Security Intelligence.

Continue reading Uncovering Risk From SAP HANA Vulnerabilities Can Be Simple and Easy

Compromised Before My Very Eyes: How I Almost Got Hacked

Here’s the story of how I almost got hacked — and what you can learn from my close call to ensure the data breach doesn’t happen to you.

The post Compromised Before My Very Eyes: How I Almost Got Hacked appeared first on Security Intelligence.

Continue reading Compromised Before My Very Eyes: How I Almost Got Hacked

Browser Vendors Are Shutting Down SHA-1 Digital Certificates

Web browsers are moving away from SHA-1 digital certificates, and organizations need to make sure they are in line with more secure measures.

The post Browser Vendors Are Shutting Down SHA-1 Digital Certificates appeared first on Security Intelligence.

Continue reading Browser Vendors Are Shutting Down SHA-1 Digital Certificates

A Future Full of Drones — and the Advanced Threats They Present

Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations.

The post A Future Full of Drones — and the Advanced Threats They Present appeared first on Security Intelligence.

Continue reading A Future Full of Drones — and the Advanced Threats They Present

Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities

The “IBM 2016 Cyber Security Intelligence Index” reveals IBM X-Force’s collected data on the threat landscape and attack types affecting all industries.

The post Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities appeared first on Security Intelligence.

Continue reading Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities

Three Steps to Stop a Threat Before It Becomes an Incident

Threats today use devices and servers to gain access to data and the corporate environment. That’s why organizations need an incident response strategy.

The post Three Steps to Stop a Threat Before It Becomes an Incident appeared first on Security Intelligence.

Continue reading Three Steps to Stop a Threat Before It Becomes an Incident

The Silver Lining of a Ransomware Infection

If you need a silver lining, think of a ransomware event as a low-cost security assessment pointing out weaknesses in your organization’s environment.

The post The Silver Lining of a Ransomware Infection appeared first on Security Intelligence.

Continue reading The Silver Lining of a Ransomware Infection