To help ensure that their sensitive data cannot be exfiltrated, some organizations have adopted data diodes, which are hardware devices designed to provide a one-way link to stop exfiltration or block remote attackers, says Mike Timan of Owl Cyber Defense.
Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path...
Organizations face a variety of security challenges as they attempt to secure their environments from the ever-changing threat landscape. As organizations look to gain more insight from their security devices, while gaining improved speed to detect and respond, Managed Detection and Response (MDR) continues to evolve...
At the start of RSA Conference 2019, Jon Callas of the ACLU discusses how attitudes toward privacy continue to evolve and why the general tenor of the conversation is not as bad as some headlines suggest.
The latest edition of the ISMG Security Report features Greg Touhill, the United States' first federal CISO, discussing how "reskilling" can help fill cybersecurity job vacancies. Plus, California considers tougher breach notification requirements; curtailing the use of vulnerable mobile networks.
Windows, MacOS and Linux operating systems don't sufficiently protect memory, making it possible for a fake network card to sniff banking credentials, encryption keys and private files, according to new research. Fixes are in the pipeline, but caution should be used before connecting to peripherals in public areas.
Every threat hunt starts with intelligence. As one of the industry's most comprehensive knowledge bases for adversary behavior, ATT&CK provides a structure for hunters to build their hypotheses and search for threats.
There are three reasons why your web and mobile application performance matters even more than before: Expectations of your customers are increasing; mobile usage has higher business impact than before; and last but not least, your users are expanding globally faster. These trends have increased pressure on...
The latest edition of the ISMG Security Report describes vulnerabilities found in popular password generator apps. Plus, the evolution of blockchain as a utility and a new decryptor for GandCrab ransomware.