Penetration Testing in 2022: Key Trends and Challenges

Penetration Testing in 2022: Key Trends and Challenges

Just when you thought that we couldn’t be any more integrated with (and dependent on) technology, the Covid pandemic swooped in to prove otherwise. The rise in the use of applications and devices to perform even basic functions pushed companies and end-users to keep pace. Of course, one group of people always seem to be ready: cybercriminals. Cyber attacks are steeply increasing, and attackers are cunning, always finding new ways to get what they want….

Read More

How to keep cybercriminals off university campuses

How to keep cybercriminals off university campuses

<!– How to keep cybercriminals off university campuses | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Role of IAM in Maintaining Cloud Security | The State of Security

The Role of IAM in Maintaining Cloud Security | The State of Security

Cloud computing is an effective solution for large and small companies across every industry. There has been rapid adoption due in large part to its accessibility, flexibility, and reliability. The cloud environment brings a significant amount of benefits, but at the same time, it can expose businesses to various alarming cybersecurity risks. A study conducted by Thales and 451 Research revealed that 40% of respondents have experienced a data breach within their cloud environments. In…

Read More

The four pillars of optimised enterprise computing

The four pillars of optimised enterprise computing

The world has become far more complicated. For businesses, the need to balance employee safety, changed expectations about how and where we work and the changing threat landscape have changed the very nature of how we use our computers. While users have always wanted safe, reliable and high performing PCs and notebooks, delivering that in the post-pandemic world is harder than ever before. And with workplaces and teams distributed more widely than ever before, manageability…

Read More

Share Your Cloud Risk Management Assessment Plan with the Board

Share Your Cloud Risk Management Assessment Plan with the Board

Quantifying and qualifying cyber risk is a longstanding challenge for CISOs. It was already a challenge for on-premise infrastructure when you knew what assets you had and where all the data lived. Cloud migration raises the bar, making it even more challenging to pinpoint cyber risk with a growing digital attack surface composed of distributed infrastructure and independently managed cloud resources used across the company. To help empower CISOs to more succinctly present their cloud…

Read More

Ansible Runner as a Service

Ansible Runner as a Service

Ansible Runner is a tool and Python library that helps when interfacing with Ansible directly or as part of another system. Ansible Runner works as a standalone tool, a container image interface, or a Python module that can be imported. The goal is to provide a stable and consistent interface abstraction to Ansible. The Ansible Runner as a Service (ARaaS) wraps the ansible runner interface inside a REST API enabling Ansible playbooks to be executed and queried from other platforms.Ensure…

Read More

Pentagon finds concerning vulnerabilities on blockchain

Pentagon finds concerning vulnerabilities on blockchain

Image: Pentagon via DHR Virginia. A report commissioned by the Pentagon concluded that the blockchain is not decentralized, is vulnerable to attacks and is running outdated software. The report, “Are Blockchains Decentralized, Unintended Centralities in Distributed Ledgers”, uncovered that a subset of participants can “exert excessive and centralized control over the entire blockchain system.” Must-read security coverage The findings of the report are a cause of concern for a wide range of sectors, but especially…

Read More

IDC: Enterprises still moving workloads back from the cloud

IDC: Enterprises still moving workloads back from the cloud

An overwhelming majority of enterprises continue to move workloads from the cloud back to on-premises data centers, although it is a smaller percentage than before, according to IDG research. A survey found that 71% of respondents expect to move all or some of their workloads currently running in public clouds back to private IT environments over the next two years. Only 13% expect to run all their workloads in the cloud, according to the survey…

Read More

Why NZ CIOs are giving ex-prisoners a second chance

Why NZ CIOs are giving ex-prisoners a second chance

An innovative programme training prisoners to become web developers is helping them get a foot in the door at some of New Zealand’s biggest IT companies. Charity Take2 was established three years ago with the aim of breaking the cycle of crime by providing pathways to employment in tech. Founder and CEO Cameron Smith tells CIO New Zealand it was during his time working in recruitment he became aware of how difficult it was for…

Read More

Anomali Cyber Watch: API Hammering Confuses Sandboxes, Pirate Panda Wrote in Nim, Magecart Obfuscates Variable Names, and More

Anomali Cyber Watch: API Hammering Confuses Sandboxes, Pirate Panda Wrote in Nim, Magecart Obfuscates Variable Names, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: API hammering, APT, China, Phishing, Ransomware, Russia, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber…

Read More
1 2,890 2,891 2,892 2,893 2,894 4,083