10 Tips for Securing Your SAP Implementation

10 Tips for Securing Your SAP Implementation

Without clear ownership of security for a critical business platform like SAP, it should come as no surprise that SAP cybersecurity continues to fall through the cracks. This article presents 10 tips that enterprises can apply to ensure their SAP implementations remain secure.

Bug bounty programs narrow the crowd

Bug bounty programs narrow the crowd

Data shows that more companies are moving away from crowdsourcing and adopting invitation-only awards programs. Do higher-quality submissions result?

11 Tips for Spotting Insider Threats

11 Tips for Spotting Insider Threats

In this Network World exclusive, I've collected advice from 11 security experts aimed at helping companies detect an insider attack sooner rather than later.

Cybersecurity professionals: Five ways to increase the talent pool

Cybersecurity professionals: Five ways to increase the talent pool

The lack of cybersecurity skills in the industry is glaring, but there are ways for educators, vendors and enterprises to fix the problem. Sean Martin explains how.

Inside the Minds of Bug Bounty Researchers

Inside the Minds of Bug Bounty Researchers

An intimate look at what makes a bug bounty run – payouts, notoriety, good will? Sean Martin investigates in this IT Security Planet exclusive.