AppSec is a fundamental requirement, but does it get enough attention?
OpenText Cybersecurity research on code security shows that organizations are only just beginning to adapt their security strategies to change. Meanwhile, the software development life cycle (SDLC) is becoming more complex and the number of threats is increasing. It raises the question of whether y... Read more
Barracuda wants customers to replace vulnerable ESG devices
Barracuda Networks is facing a massive problem with its e-mail security products. All affected ESG appliances must be replaced, including those from customers who have already obediently installed a previously released patch.
Email Security Gateway (ESG) appliances from Barracuda may be affected... Read more
Cisco moves to better secure hybrid cloud environments and apps
Cisco frequently uses the slogan "If it's connected, it's protected." As a giant in the networking industry and a player in the security market, it also has the expertise to tie these two domains together. With Cisco Secure Access and Multicloud Defense, the company is taking on many aspects of sec... Read more
Verizon survey: ransomware is ubiquitous
The Verizon Data Breach Investigations Report survey shows that ransomware is one of the leading variants in breaches. Yet statistically, the share of ransomware remains stable at 24 percent, while there were significant increases in previous years.
Studies around breaches and incidents regularl... Read more
Log4Shell in 2023: big impact still reverberates
Log4Shell hit the market hard at the end of 2021. According to a recent story we published, it's still one of the biggest vulnerabilities, 18 months after it initially appeared. How serious is the threat of Log4Shell in 2023?
Log4Shell continues to haunt us. The exploitation of a vulnerability i... Read more
AI creates identity crisis in security world
Artificial intelligence is going to shake up security. RSA CEO Rohit Ghai stated at RSA Conference that it is becoming necessary to give AI more and more responsibility over securing digital environments. This particularly because IT security could otherwise be killed by that same technology.
At... Read more
Confidential computing creates enclaves of privacy and security
Confidential computing is essentially a type of technology that aims to improve data privacy and security. The hardware-based technology works by using encrypted computation on sensitive data, and then isolating that data from host resources. Data, therefore, remains separate from applications and ... Read more
Not all XDR platforms are created equal: quality telemetry is critical
Organizations are poorly prepared for cyber attacks, according to Cisco's recent Cybersecurity Readiness Index. Surely now is the time to tackle security from a platform perspective, we hear from Cisco's Tom Gillis.
Gillis joined Cisco at the beginning of this year, after a stint at VMware. With... Read more
Back-ups should be part of a modern layered security approach
Rubrik has recently been increasingly asserting itself as a security vendor. The announcement in late 2022 of Cyber Recovery seemed like a good reason to talk to Anneka Gupta, Rubrik's Chief Product Officer. What can we expect from Rubrik and more generally from backups in terms of security?
Wit... Read more
Genesis Market: how did it operate and how was it taken down?
The cybercrime world will have to endure without Genesis Market, now that it has been taken down by authorities on April 4. Criminals were able to sell countless sets of data from unsuspecting victims on the platform. What makes the fall of Genesis Market significant in a world full of cybercrime?
... Read more
As fear of cyber threats rises, organizations have to review their security strategy
“Frankly, I live in terror of a ransomware attack and state-sponsored intrusions.”
This quote from a business professional comes from the 2023 SonicWall Cyber Threat Report. It perfectly captures what organisations are currently very concerned about. Ransomware has been keeping organisations... Read more
Zero trust in complex environments: how to ensure secure access to apps?
Many companies have seen their infrastructure and application landscape become more complex. This, in turn, creates new challenges. After all, how do you properly set up identity and access management? The basic zero trust component is essential for authentication and access to protect users, apps ... Read more