The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.
The latest edition of the ISMG Security Report discusses "Orwellian" surveillance activity in 2020 via the ToTok app. Also featured: the controversy over enabling law enforcement to circumvent encryption; the cyberattack risks posed by IoT devices.
Not even George Orwell could have predicted nation-state surveillance in the 21st century. Give us free instant messaging for our smartphones, and faster than you can say "viral kitten video," we're collectively part of a mass surveillance nightmare. Case in point: The ToTok social messaging app.
11 Best Practices to Minimize Risk and Protect Your Data
By now, we are all too aware of the consequences of a data breach:
Brand damage
Loss of customer confidence
Potentially costly litigation
Regulatory fines
However, most organizations are not as familiar with how to prevent these attacks. They still spend...
Cyberattacks and data breaches cost the global
economy trillions of dollars annually, with some
forecasts estimating as much as $6 trillion annually by
2021.
To truly slow hackers down -- and to prevent
as much damage as possible before it ever happens
-- a more proactive approach to security is...
The Sophos 2020 Threat Report is out, and among the key findings: Ransomware attackers continue to leverage automated active attacks that can evade security controls and disable backups to do maximum damage in minimal time. John Shier of Sophos analyzes the trends that are most likely to shape the 2020 cybersecurity...
With the goal of becoming an international university XJTLU needed to ensure that their website was high performing and available for users anywhere in the world. However, with infrastructure focused on campus, access to XJTLU's site was intermittent and slow for off campus users. This poor performance was magnified...
Most IT departments don't have visibility into what open source components developers are using or have used, and also don't have the time, budget or internal resources to run a meaningful vendor software testing program.
Download this white paper and learn about:
Securing third-party applications;
Using open...
Application-level visibility is a must-have to ensure service quality, end-user experience and performance as well as to reduce security risk.
Download the EMA report, "Understanding the Value of Application-Aware Network Operations" to learn more about the benefits of true application visibility needed for...
What is the risk of having too many cybersecurity tools? Compromised visibility because of "tool sprawl," say Brian Murphy and Seth Goldhammer of ReliaQuest. Enterprises are now awakening to this challenge and attempting to overcome it.
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.
Robotic process automation aims to use machine learning to create bots that automate high-volume, repeatable tasks. But as organizations tap RPA, they must ensure they take steps to maintain data security, says Deloitte's Ashish Sharma.
Large or small, enterprises from all sectors are dealing with the same vulnerabilities in open source code. The difference: the scale of the problem. DJ Schleen of Sonatype discusses insights from the latest ISMG roundtable dinner.
As part of a multi-city tour, ISMG and Sonatype visited Atlanta recently for an engaging discussion on how to mitigate risks introduced by open source code. Here's a conversation with DevOps advocate Derek Weeks.
Amidst a multi-city tour, ISMG and Sonatype visited Boston for an engaging discussion on how to mitigate risks introduced by open source software. Sonatype CMO Matt Howard discusses how the conversation highlights the offense vs. defense approaches to securing critical applications.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.