The consistency challenges that enterprise security teams are faced with has never been more complex, especially for the role of a CISO.
The CISO's team - from security architects, engineers and analysts to program managers - spends most of its time managing the balancing act of keeping tools & technology working...
When managing an enterprise security platform, visibility into the innerworkings of all the security tools and
processes present in the environment is critical, but it's often the last measure put in place, if at all. This lack of
visibility makes it difficult to ensure systems operate correctly and increases the...
For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods...
The coming end-of-support for Windows Server 2008 leaves organizations with few viable options to receive updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
Airline booking system provider Amadeus - whose system is used by 500 airlines - is investigating a software vulnerability that exposed passenger name records, which is the bundle of personal and travel data that gets collected when booking a flight.
In order to gain complete visibility into all of your organization's cloud assets, you cannot focus just on assets managed within known IaaS accounts. You must index everything routable on the public Internet to discover all your cloud assets, including those outside management, to ensure nothing is missed.
Learn...
The recent exposure of customer data on the website of Singapore Airlines as a result of a software bug is further evidence of the persistent challenge of adequately addressing security during the development stage.
Despite increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. However, when a significant percentage of breaches are caused by weak, stolen, or reused passwords, it's clear passwords pose significant risks that can't be...
Despite increased use of two-factor authentication and biometrics, passwords are still the most common form of authentication. However, when most breaches are caused by weak, stolen, or reused passwords, it's clear passwords pose significant risks that can't be ignored.
From potential security breaches to increased...
Recent analysis by F5 Labs shows that 68% of malware installed through phishing is hiding in encryption. Security inspection tools such as next-generation firewalls, intrusion prevention systems, data loss prevention systems, and others are increasingly blind to SSL/TLS traffic. In some cases, they introduce latency...
Account takeover is a rapidly growing arena for
cybercriminals. How can organizations strengthen
both authentication and authorization?
Download this white paper to learn more about:
Why account takeover fraud is a growing and strengthening problem;
How organizations can strengthen authentication and...
Encrypting and decrypting traffic consumes a lot of computational power, so many security inspection solutions either don't decrypt at all or take such a huge performance hit that they pass along encrypted traffic just to keep up. Whether its traffic coming into your application or internal traffic going out to the...
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications.
However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your...
Open source components help developers build and deploy applications faster, but with increased speed comes greater risk. Maria Loughlin of Veracode describes how to reduce those risks through several steps, including component inventories and developer education.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.