Application Security March 5, 2019 Blockchain: Making the Reward Much Greater Than the Risk 5 min read - The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
Software Vulnerabilities March 4, 2019 Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems 4 min read - Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.
Data Protection February 19, 2019 Lessons from the Encryption Front Line: Core Components in the Cloud 3 min read - Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
February 14, 2019 Catastrophe, Not Compromise: VFEmail Attack Destroys Decades of Data 2 min read - The email provider VFEmail suffered a "catastrophic" hack that destroyed the company's primary and backup data servers in the U.S.
CISO February 14, 2019 Why You Need a Security-First Culture to Deliver on Your Customer-First Goals 4 min read - Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives.
Application Security February 7, 2019 Moving to the Hybrid Cloud? Make Sure It’s Secure by Design 4 min read - Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.
CISO February 1, 2019 Data Breach Fatigue Makes Every Day Feel Like Groundhog Day 5 min read - The incessant stream of high-profile data breaches can make every day seem like Groundhog Day. How can businesses combat data breach fatigue and rebuild trust through improved breach response?
Data Protection January 29, 2019 How to Build a System Hardening Program From the Ground Up 6 min read - System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.
Endpoint January 24, 2019 As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? 4 min read - While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices.
Threat Hunting January 22, 2019 Embrace the Intelligence Cycle to Secure Your Business 5 min read - Whether you're protecting data, financial assets or even people, the intelligence cycle can help you gather data and contextualize it in terms of what you already know and what you hope to learn.