Top

Tag: Security


Editorial

5 Ways To Hire and Retain More Women in Cybersecurity

November 30, 2020

Via: Diana Beverly Ross

“I would say to women starting out in cyber to stop asking permission, and stop waiting for opportunities. If you want to transition internally ask how your employer can help you, not if they will permit you.” Eliza May Austin, […]


Application security, Security

4 steps to DevSecOps in your software supply chain

November 11, 2020

Via: InfoWorld

Developers often want to do the “right” thing when it comes to security, but they don’t always know what that is. In order to help developers continue to move quickly, while achieving better security outcomes, organizations are turning to DevSecOps. […]


Network security, Security

IT Priorities 2020: After Covid-19, security goes back to basics

November 10, 2020

Via: Computer Weekly

At the beginning of 2020, risk management and compliance were seen as the top spending priorities for CISOs, and while this remains a key area of focus, much has changed. According to the new data, which was compiled in September […]


Network security, Security

How network segmentation mitigates unauthorized access risk

November 4, 2020

Via: CSO Online

Especially with the pandemic, organizations want their technology accessible from any location. Security vulnerabilities, however, dictate that it may not be wise to expose everything to the internet. I have seen businesses or educational institutions set up all their computers […]


Editorial

Top Password-Cracking Techniques Used by Hackers – How Do They Work?

October 29, 2020

Via: Natalie Dunn

While passwords are the most popular account security tool, they aren’t necessarily the safest option. Security experts agree that human beings are the weakest link of any security system. Most often, users create weak passwords, store them as plain text, […]


Network security, Security

What is a supply chain attack? Why you should be wary of third-party providers

October 29, 2020

Via: CSO Online

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changes the attack surface of the typical […]


Application security, Security

4 Approaches to Securing Containerized Applications

October 21, 2020

Via: Radware Blog

As more and more enterprises are on the journey towards adopting containers running microservices, they are also scratching their heads trying to figure out which is the right way to secure these ecosystems. Radware’s Web Application Security Report suggests that […]


Network security, Security

CIOs say security must adapt to permanent work-from-home

September 30, 2020

Via: CSO Online

The entire US economy and government were forced to shut down in-person facilities and operations almost overnight in March as COVID quarantines began. The new conditions forced organizations to quickly find ways to secure tens of millions of new, vulnerable […]


Application security, Cloud security, Security

Application Security in Today’s Multi-Cloud World

September 29, 2020

Via: Radware Blog

Managing applications in heterogeneous cloud environments introduces new challenges for IT, DevOps and application owners. One of these challenges of is that each environment offers different capabilities, resulting in inconsistent management and deployment of application delivery and security services, policies […]


Cyber-crime, Phishing

What to do if you fall for a phishing attack?

September 28, 2020

Via: Panda Security

The fact that people fall for phishing scams is arguably the biggest reason why such tactics are still actively used by cybercriminals. Bad actors send hundreds of thousands of emails every day, and they still consider it a win even […]