Without clear ownership of security for a critical business platform like SAP, it should come as no surprise that SAP cybersecurity continues to fall through the cracks. This article presents 10 tips that enterprises can apply to ensure their SAP implementations remain secure.
Ever wonder who's behind some of the attacks we hear about in the news? Here are eight advanced persistent threat (APT) groups that operate some of the most successful and well-known malware campaigns worldwide.
In this Network World exclusive, I've collected advice from 11 security experts aimed at helping companies detect an insider attack sooner rather than later.
The lack of cybersecurity skills in the industry is glaring, but there are ways for educators, vendors and enterprises to fix the problem. Sean Martin explains how.
More than 300 cybersecurity professionals from Ireland as well as the UK, the European Union, the US and beyond joined each other in Dublin for the 2015 installation of IRISSCON.