January 2018

The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyberattacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats. Key takeaways The first set of SAP Security Notes in 2018 consists of 10 […]

by

The Cyber Threat was written to help executives, especially those without a deep background in cybersecurity, understand the nature of adversaries in cyberspace. The book includes a new section on the technological environment that can help decision-makers get their heads around the new tech enabled world arising around us. The book also captures key lessons […]

by

The Cyber Threat was written to help executives, especially those without a deep background in cybersecurity, understand the nature of adversaries in cyberspace. The book includes a new section on the technological environment that can help decision-makers get their heads around the new tech enabled world arising around us. The book also captures key lessons […]

by

If 2017 taught us anything, it is that cybersecurity and data privacy are going to remain hot button issues for business leaders from here on out. As we get into the swing of 2018, major legal cases and proposed state and federal legislation will shape how companies respond to and attempt to mitigate cybersecurity and […]

by

Wayne State University, Red Level Networks install patches to protect computers Chip processor vulnerabilities could harm small businesses Cybersecurity has seen a boon in recent years Businesses large and small are being advised to fortify their cybersecurity in the face of Spectre and Meltdown bugs that affect processing systems for personal computers and smartphones. IT […]

by

Wayne State University, Red Level Networks install patches to protect computers Chip processor vulnerabilities could harm small businesses Cybersecurity has seen a boon in recent years Businesses large and small are being advised to fortify their cybersecurity in the face of Spectre and Meltdown bugs that affect processing systems for personal computers and smartphones. IT […]

by