In April 2019, researchers Dmitry Chastuhin and Mathieu Geli presented a talk at the OPCDE Cyber Security Conference about two pieces of exploit code that allow anyone to interact with SAP and perform unauthorized transactions. For example, attackers could use the code to shut down an entire SAP system, execute…
Read More
Recently, IBM Security announced the results of the “2019 Ponemon Institute Study on the Cyber Resilient Organization,” the fourth annual look at cross-industry preparedness for cybersecurity. Each report has taken a year-over-year look at the current state of cyber resilience and the business’ ability to maintain its core purpose in…
Read More
Because innovation is moving so rapidly, keeping up with industry best practices can seem like a full-time job on its own. Plus, attackers are constantly evolving their campaigns, often exploiting zero-day vulnerabilities with attacks that have no known signature — allowing them to evade detection from most security tools. How…
Read More
Large tech and social media companies often share user data with other businesses for marketing purposes. In recent history, there have been many publicized breaches and other security incidents involving the personally identifiable information (PII) stored by these companies. This only creates a perfect storm for more breaches. Enterprises that…
Read More