T-Mobile has issued an apology and is offering free identity theft recovery services to almost 48 million customers after hackers declared that they had obtained personal data from up to 100 million…
Category: English
Improved Security Trends Emerge
Promising security trends such as SASE, CWPP, and CSPM are being developed to integrate security into modern business networks. Observability, a traditional software monitoring approach, is being adapted to meet the sophisticated…
Secure Cloud Infrastructure Entitlement
Companies are rapidly increasing their usage of multi-cloud and hybrid-cloud infrastructures, and adopting agile software deployments, resulting in a greatly increased attack surface for potential malicious actors. Cloud Infrastructure Entitlement Management (CIEM)…
API Security: A Necessity
API security has become a highly important issue, with 94% of companies experiencing an API security incident in a 6-month period. Attackers are taking advantage of API vulnerabilities to gain access to…
2022 Cybersecurity Challenges Ahead
In 2021, the cyber industry was faced with the challenge of balancing prevention and response, making patching difficult and requiring careful prioritization. Ransomware gangs evolved into sophisticated businesses, with one even going…
Apache Log4J Vulnerability Exploited
A major vulnerability in the open-source Apache Log4J logging library is being exploited by malicious actors and is expected to cause major security issues in 2022. This library is used on over…
Minimizing Data Risks
It is possible to reduce the risk associated with handling personal data by conducting a risk assessment of an organization’s internal and external systems, establishing security parameters, replacing data with unique identifiers,…
Cloud-Native Security: A Must
Ninety-six percent of organizations are utilizing or assessing Kubernetes in production, showing the prevalence of cloud-native technologies. Security worries have kept IT administrators from accelerating their cloud-native agenda, and fifty-five percent of…
Modern Network Security: Log4j
Log4j is the latest vulnerability to show the fragile security of modern networks. It emphasizes the difficulty of protecting current business networks, caused by the use of open-source software and the lack…
Secure Networking with CAASM
Reducing the attack surface of a company’s network should be a top priority for all organizations. At RSA Conference 2022, advanced systems to help companies inventory their cyber assets and close security…