Securing the public cloud is not as challenging as it used to be, but too many organizations are still taking the wrong approach, says Microsoft's Jonathan Trull. Understanding the shared responsibility model for security is critical, he says.
As global enterprises tackle the complexities of cloud-first deployments, changing threat and regulatory landscapes, and merging IT and operational technology (OT) networks, implementing a security strategy without any gaps has become an overwhelming challenge. As such, organizations are increasingly automating...
Vulnerabilities don't exist in a vacuum. The risk they pose depends on a variety of factors both internal and external that are in a near-constant state of change - and keeping up with that change is vital to limiting your risk of attack.
Enter: The 2019 Vulnerability and Threat Trends Report which examines new...
Cloud-based CRM giant Salesforce.com is warning some of its Marketing Cloud users that any data they stored may have been accessed by third parties or inadvertently corrupted because of an API error that persisted for six weeks.
The need to secure cloud applications and address the security gaps in flat data center architectures is leading more organizations to adopt microsegmentation technology, says VMWare's Bruce Davie.
Why are attacks so successful? Legacy endpoint security products are creating more problems than they solve. There is too much cost and complexity, defenses aren't keeping up, and security staff is stretched thin.
Silicon Valley employees are increasingly calling on executives to restrict the use of facial recognition technology, mobilized in part by the U.S. government's previous policy of separating children from parents at the border. Experts say facial recognition regulations are needed - and quickly.
Cyberattacks and damages due to email breaches dramatically increased again this past year. The FBI estimates $5 billion in losses worldwide as email continues to be a primary attack vector for the initial compromise, with business email compromise accounting for $676 million in losses alone in 2017.
As SMB...
Businesses undertaking digital transformation - typically involving a push to the cloud, amongst other initiatives - must put security first if they want their project to achieve optimum success, says Fortinet's Patrick Grillo.
Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.
Recent failures of IT systems at some major airports and banks are a reminder that as an organization launches a digital transformation project, or seeks to move more of its processes to the cloud, those efforts won't necessarily proceed smoothly or securely, says Skybox Security's Justin Coker.
Businesses spend billions each year on identity and access management, but almost all of this money is spent on protecting the digital identities of humans - usernames and passwords.
On the other hand, businesses spend almost nothing on protecting machine identities, even though our entire digital economy hinges...
Sandip Kumar Panda, co-founder and CEO of InstaSafe, which offers a software-defined perimeter solution, talks about his company's approach toward secure connectivity.
StackRox CTO Ali Golshan says his firm helps organizations that use containers and microservices to secure their cloud applications via better detection, prevention and response. How does it work?
Ian Eyberg is CEO of DeferPanic, a Unikernel-based infrastructure-as-a-service startup that provides containers that help organizations employ virtualization in a more secure manner. How does it work?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.