Understanding the security risks of outdated software

Understanding the security risks of outdated software

More than 1,000. That’s the average number of applications used by enterprises, according to a 2023 Salesforce report. While more software can help improve operations and streamline staff workloads, more apps can also introduce risk — especially if they’re outdated. This is a perfect storm for malicious actors: Increasing software usage makes it harder for businesses to know what they have and where it’s located while aging apps are harder to patch and protect. Here’s…

Read More

How organizations can defend against the increasing API attack surface

How organizations can defend against the increasing API attack surface

Application programming interfaces (APIs) are growing in prominence. As APIs increase beyond the range of manual control, organizations may face greater security challenges.  Here, we talk to Karl Mattson, Director, Security Technology Strategy at Akamai.  Security magazine: Tell us about your title and background.  Mattson: With over 25 years of experience in cybersecurity and technology leadership roles, I have had the privilege of leading teams across financial services, retail, and federal government sectors. In July 2021,…

Read More

How IT leaders can balance software needs with limited budgets

How IT leaders can balance software needs with limited budgets

Compared to previous years, IT SaaS app usage and spending are up in 2024. IT teams showed the highest average SaaS portfolio growth for 2 years running while spending is expected to grow by 15-20% annually, according to a recent report from Gartner. However, IT leaders should not expect their budgets to increase to meet this demand. In reality, most IT teams are juggling tight budgets due to a shaky economy and the challenges faced…

Read More

8 vulnerabilities found in macOS operating system Microsoft apps

8 vulnerabilities found in macOS operating system Microsoft apps

Researchers from Cisco Talos have discovered 8 vulnerabilities in macOS operating system Microsoft apps. Through these vulnerabilities, a malicious actor can bypass an operating system’s permission model via existing permissions without requiring additional verification from the user. Successful attacks could grant a malicious actor any privilege already gained in the targeted application, such as sending emails, recording video and audio, or capturing pictures. According to the research, Microsoft considers these vulnerabilities to be a low…

Read More

Product spotlight on cybersecurity

Product spotlight on cybersecurity

Cybersecurity is a constant priority for business as new threats emerge each day. Security magazine highlights a variety of cybersecurity products to protect data and businesses. BEAZLEY Quickly Detect and Respond to Threats Beazley Security’s Managed eXtended Detection and Response (MXDR) service combines human intelligence with advanced technologies and external data sources to provide clients around-the-clock protections. The MXDR provides total transparency to cyber operations, and uncomplicated endpoint-based pricing that includes unlimited data ingestion and long-term retention…

Read More

F5: AI Applications Will Complicate ‘Unsustainable’ Hybrid Multicloud Sprawl in Australia

F5: AI Applications Will Complicate ‘Unsustainable’ Hybrid Multicloud Sprawl in Australia

The widespread integration of AI into enterprise applications, predicted to surge as soon as 2025, could further complicate the already challenging management of hybrid multicloud strategies in Australia and APAC regions and make them more unsustainable, according to application delivery and security firm F5. Kara Sprague, executive vice president at F5, told TechRepublic in Australia that the growth of AI applications will accelerate the complexity, cost and attack surface associated with enterprises’ use of multiple…

Read More

An intelligent application future hinges on using responsible AI

An intelligent application future hinges on using responsible AI

As enthusiasm for AI builds and regulation gains momentum, investing in “doing generative AI” responsibly and ethically is not just the right thing to do — it will give companies a competitive advantage. Responsible AI helps mitigate operational, financial and competitive risks. Plus, data shows that companies leveraging responsible AI practices may be better positioned to attract and retain talent.  Unfortunately, there’s no industry standard for what responsible AI should look like. Stanford researchers found…

Read More

Protect Your Cloud Environments with Data Security Observability

Protect Your Cloud Environments with Data Security Observability

Data is the new fuel for business growth Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of information at our fingertips allows us to correlate data points and determine patterns and outcomes faster than humanly possible — enabling us to predict and quickly thwart adverse events on the horizon. We know that the…

Read More

Cisco Secure Workload 3.9 Delivers Stronger Security and Greater Operational Efficiency

Cisco Secure Workload 3.9 Delivers Stronger Security and Greater Operational Efficiency

The proliferation of applications across hybrid and multicloud environments continues at a blistering pace. For the most part, there is no fixed perimeter, applications and environments are woven together across datacenters and public cloud providers. The attack surface has expanded. Organizations struggle with a lack of visibility, and vulnerabilities are a constant issue for application and security teams alike. In some cases, the vulnerability is known and flagged, but there is no patch available, and…

Read More

Hao-Wei Chen | Top Cybersecurity Leaders 2024

Hao-Wei Chen | Top Cybersecurity Leaders 2024

With frequent childhood moves, Hao-Wei Chen had to learn how to adapt from an early age. He frequently experienced culture shock while attending different schools to accommodate his father’s career shifts, having to learn new languages alongside his regular studies. Chen’s introduction to the security field came when he was 17. Chen’s introduction to the security field came when he was 17. Working as a developer and security tester, he launched the educational website Hacker.org.tw…

Read More
1 2 3 4