Application security, Cloud security
May 10, 2019
Via: Security IntelligenceThink about a revolutionary invention. What’s the first thing that comes to mind? Maybe it’s the advent of the internet, or perhaps your brain skipped all the way back to the steam engine. When asked that question, how many people […]
January 16, 2019
Via: Security IntelligenceAs breach rates climb and threat actors continue to evolve their techniques, many IT security teams are turning to new tools in the fight against corporate cybercrime. The proliferation of internet of things (IoT) devices, network services and other technologies […]
October 2, 2018
Via: Security IntelligenceData breaches that compromise hundreds of thousands — or millions — of records tend to grab the most headlines, but small- and medium-sized businesses (SMBs) are far from immune to cyberattacks. SMB security is full of holes, and these vulnerabilities […]
July 20, 2018
Via: AberdeenThe majority of applications being used today are SaaS (Software-as-a-Service) solutions accessed via the cloud. The convenience of apps such as Google’s G-Suite, Salesforce, Basecamp, and others brings with it the challenge of securing all the data being transmitted by […]
June 19, 2018
Via: Dark ReadingDo ‘cloud-first’ strategies create a security-second mindset? Too often, I hear system administrators tell me that their organization’s cloud-first strategy is jeopardizing security. With each new software-, infrastructure, and platform-as-a-service adopted by line-of-business users or within enterprise IT, security seems […]
November 16, 2017
Via: Dark ReadingBy their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords. There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn’t hesitate to recount all […]
October 4, 2016
Via: Computer WeeklyAlthough many people are aware of phishing attacks, there are still a large number of successful compromises. Phishing attacks counterfeit communications from a legitimate/trustworthy source to mislead recipients into revealing sensitive information. Email containing malware-infected links is the main means […]
September 22, 2016
Via: Security IntelligenceSmaller businesses, like the HVAC company that caused the Target penetration in 2013, often think they are too small to be security targets, but SMB cybersecurity can have big implications. Size doesn’t matter as long as your firm has something […]
September 21, 2016
Via: CSO OnlineIoT is complex, fast-growing and often intertwined with systems that govern things like water and power. That makes IoT security a critical requirement, but it’s one that’s not necessarily well understood. The Industrial Internet Consortium, a group that includes some […]
September 20, 2016
Via: InfoWorldCompromised vendor systems have led to several major data breaches recently. And sometimes, vendors get breached because of a partner’s lax security. A group of tech companies led by Uber are banding together as the Vendor Security Alliance to prevent […]
September 19, 2016
Via: CSO OnlineBy now we’re all well aware of what makes a bad password … it’s us. A glance at SplashData’s annual reporting on the world’s worst passwords shows just how laughably bad at creating passwords us humans really are. But what’s […]
July 1, 2016
Via: InfoSecurity LiveEmail security is a major concern in enterprises where transmission and storing of email is snooped by the hackers. The only way to strengthen is to follow the best security practices with respect to the service providers. In the enterprise, […]
December 14, 2015
Via: Help Net SecurityTurn the Cyber Kill Chain against your attacker Created by Lockheed Martin, the “Cyber Kill Chain” model has traditionally been used to describe the evolving stages of a cyber attack. However, if this model is applied to internal security processes […]
September 25, 2015
Via: cloud-securityIf your organization is like most, you’re likely using or considering cloud-hosted #applications and #infrastructure. Security in the cloud is just as important as security in on-premises IT environments, though it’s different in several important ways. There are many great […]
September 3, 2015
Via: cloud-securityWhen was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck … well, if not terror, then certainly groans in the […]
April 17, 2024
April 23, 2024