In today's highly connected, cloud-based environment, application security is more critical than ever, says Jeff Williams, co-founder and CTO of Contrast Security, who explains why.
Many organizations struggle to understand what cloud assets they actually have. Sam Curcuruto of Expanse explains the role cloud governance plays in gaining better clarity and control.
Blair Bonzelaar of Okta discusses the requirements for making the transition to a zero trust model for securing enterprises and offers practical identity management insights.
Britain's biggest businesses continue to inappropriately expose servers and services to the internet, putting the organizations and data at risk, according to a study by Rapid7. Tod Beardsley describes the findings, including a widespread lack of phishing defenses as well as cloud misconfigurations.
Hacking and extortion attempts against organizations have unfortunately become all too commonplace these days. On Tuesday, an unlikely victim went public: the British band Radiohead. But was the band really a hacking and extortion victim?
As the IT infrastructure evolves and becomes far more complex, security needs to be built in, not bolted on later, says VIjendra Katiyar of Trend Micro.
The fallout from the 2015 TalkTalk hack continues as a 22-year-old U.K. man was sentenced to jail Monday for his role in the attack and other cybercrimes, including an attack against his former school.
License plate and traveler photos collected at the U.S. border have been compromised after a federal government subcontractor was hacked. While Customs and Border Protection officials claim the image data hasn't been seen online, security experts say it's already available for download via a darknet site.
"We are at a phase where we are moving from information-centric security to behavioral-centric security," says Harshil Doshi, security strategist at Forcepoint.
The amount of malware that targets IoT devices has grown more than 80 percent in the past year, says Shrenik Bhayani of Kaspersky Lab. He provides an overview of the changing threat landscape, including attacks on critical infrastructure.
What are the top trends shaping the rising tide of financial fraud in 2019, and what can security professionals expect in the months and years to come? Trace Fooshee of Aite Group discusses changes in the fraud landscape.
The bulk of IoT security needs to be taken care of at the network level, which requires a more connected approach to security, says Kiran Mohandas of Juniper Networks.
With digital transformation, many applications are leaving corporate data centers and moving to the cloud, says Shakeel Khan of Zscaler, who discusses the security implications.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.