Top

Category: BI Security


BI Security

Securing Azure Kubernetes with Falco

March 15, 2024

Via: InfoWorld

Falco, the open-source, cloud-native, runtime security tool, recently graduated from the Cloud Native Computing Foundation’s incubation program. That means it’s considered stable and ready for use in production environments, including Azure. It joins many of the key components of a […]


BI Security

TotalEnergies upgrades OT network to increase safety, performance, cyber security

March 13, 2024

Via: Computer Weekly

Major oil company TotalEnergies has upgraded its operational technology (OT) network with infrastructure from connectivity services and intelligent networking tools provider Allied Telesis, as part of its plan to ensure legacy OT in its North Sea oil platforms is replaced […]


BI Security

Ransomware increases urgency of documented DR plans

March 11, 2024

Via: Network World

The existence of backup copies or replicas isn’t enough if you don’t understand how to efficiently restore data and systems at scale. Ransomware has moved disaster recovery planning from the back room to the front table. It’s understandable to think […]


BI Security

Going passwordless with passkeys in Windows and .NET

March 7, 2024

Via: InfoWorld

Passwords are a problem. While they remain the main way we secure applications, services, and systems, they’re increasingly vulnerable. Cloud compute makes it economical to brute-force valuable passwords, while poorly-thought-out password policies drive users to inherently risky behaviors. And while […]


BI Security

The future of European cybersecurity is autonomous

March 4, 2024

Via: CIO

The rapidly evolving cybersecurity landscape in Europe is forcing CISOs to adopt new measures to protect their organisations and plan for the future. In the hunt for a solution, artificial intelligence and autonomous endpoint management are leading a new generation […]


BI Security

Biden executive order protects personal data

March 1, 2024

Via: InfoWorld

President Joseph Biden has issued an executive order intended to protect Americans’ sensitive personal data from exploitation from countries of concern including China, Russa, Iran, and North Korea. Issued February 28, the order authorizes the attorney general to prevent the […]


BI Security

Why passkeys will replace passwords

February 29, 2024

Via: InfoWorld

With the growth of sophisticated attacks against critical software and infrastructure systems, multi-factor authentication (MFA) has emerged as a critical layer of defense against unauthorized access. An increasing number of enterprise and developer-facing technology applications and platforms, from GitHub to […]


BI Security

High-risk open source vulnerabilities on the rise, Synopsys reports

February 28, 2024

Via: InfoWorld

Nearly three-quarters of codebases assessed for risk by Synopsis in 2023 contained open source components with high-risk vulnerabilities, according to a just-released report from the company, a provider of application security testing tools. While the number of codebases with at […]


BI Security

Gartner: Three top trends in cyber security for 2024

February 19, 2024

Via: Computer Weekly

Security and risk management leaders face disruptions on multiple fronts: technological, organisational and human. Preparation and pragmatic execution are vital to address these disruptions and deliver an effective cyber security programme. Gartner believes investing in effective risk management of third-party […]


BI Security

Security-by-design push prompts new ISC2 accreditations

February 15, 2024

Via: Computer Weekly

With security-by-design principles becoming more widely adopted and enforced around the world, professional security training and accreditation body ISC2 is set to launch a new software security certification to upskill professionals in this increasingly important area of security practice. Security-by-design […]


BI Security

5 Wi-Fi vulnerabilities you need to know about

February 14, 2024

Via: Network World

Effectively securing enterprise Wi-Fi networks is about more than simply setting up the latest encryption or implementing 802.1X authentication. Those are certainly important, but there are many more vulnerabilities to consider. Whether you’re trying to troubleshoot strange Wi-Fi behavior or […]


BI Security

Trends driving cyber security in 2024

February 12, 2024

Via: Computer Weekly

Asking the question about how much IT security is enough is about as useful as enquiring about the length of a piece of string. The answer is, “it depends”. What is certain, however, is that the threat landscape is changing. […]


BI Security

Cisco amps up security breach protection service

February 12, 2024

Via: Network World

Cisco is adding a new top-level service tier to its suite of security offerings aimed at helping customers monitor, detect, investigate and remediate threats across the enterprise. New to the lineup is a Premier level of service for Cisco’s Breach […]


BI Security

Data Privacy vs. Data Security

February 8, 2024

Via: DATAVERSITY

Data privacy refers to a framework of laws, protocols, and controls designed to protect personal data from unauthorized access and use. It encompasses a range of information, including but not limited to names, addresses, financial details, social security numbers, and […]


BI Security

IT security strategy: Assessing the risks of generative AI

February 5, 2024

Via: Computer Weekly

IT security leaders are recognising the risks and opportunities of generative artificial intelligence (GenAI) for enterprise IT. In April 2023, a survey conducted with Gartner’s Peer Community of IT and security leaders found that almost all of the 150 people […]


BI Security

Insights into IR sniping and AI’s changing face of cyberthreats

February 1, 2024

Via: CIO

In today’s rapidly evolving cybersecurity landscape, having a proficient security team in place is not enough. Organizations must understand the nuances of modern risks. The third and fourth episodes of the Unit 42 Threat Vector podcast shed light on two […]


BI Security

The risk of VPN

February 1, 2024

Via: Network World

Zero Trust is not a single technology or architecture, but a set of principles to help you improve your business security posture. Minimizing the network attack surface should be the first item on your Zero Trust journey. The goal is […]


BI Security

Data Under Siege? Combatting the Weaponization of Information in the Digital Age

January 31, 2024

Via: DATAVERSITY

The emergence of generative AI marks a pivotal shift in the digital landscape, profoundly impacting our ability to discern reality from fabrication. This technology, capable of producing highly convincing and realistic content such as news articles, social media posts, images, […]


BI Security

Protecting against software supply chain attacks

January 30, 2024

Via: InfoWorld

Last year’s MOVEit and 3CX vulnerabilities offered a stark reminder of the risk software supply chain attacks pose today. Threat actors exploit vulnerabilities to infiltrate a software provider’s network and modify the software’s original functionality with malicious code. Once the […]


BI Security

Deep Instinct Strengthens File Upload Protection

January 30, 2024

Via: Database Trends and Applications

Deep Instinct, the prevention-first cybersecurity company, is releasing Deep Instinct Prevention for Applications (DPA) v3.0, adding enhanced file upload protection and application storage security capabilities in disconnected or air-gapped environments. DPA v3.0 is an agentless, on-demand, anti-malware solution that is […]