Detect Threats with Runtime Security

Detect Threats with Runtime Security

Although containerization provides a reliable and lightweight runtime environment that is consistent from host to host, it only adds to the complexity that stems from multi-cloud infrastructure services and the need to maintain legacy servers and virtualized data centers. This opens up a new range of security risks coming from the nature of the environment. A common example of this environment is a container running on a host with a specific network setup, and in…

Read More

Event-Driven Architectures & the Security Implications

Event-Driven Architectures & the Security Implications

In an era of rapid digitization, growth can come so quickly and massively that you cannot react fast enough. In a bid to keep up, the software industry developed new design paradigms and operational methodologies—like distributed systems, cloud computing, and Agile methodology. These new ways of doing things had one principle in common: Crush the rock into gravel, and you can do more with it. So, from the crushed rock of monolithic system design came…

Read More

Cyber Insurance Coverage Checklist: 5 Security Items

Cyber Insurance Coverage Checklist: 5 Security Items

Carriers who require EDR as a security control should accept XDR as a solution. And with the main objective being to improve security maturity, organizations should be looking to enhance detection and response capabilities beyond EDR with XDR. XDR is simply an extension of EDR. Whereas EDR only detects at the endpoint level, XDR can collect and correlate threat activity data across endpoints plus servers, cloud, networks, and email. Done well, XDR can help to…

Read More

A Secure Access Service Edge (SASE ) Guide for Leaders

A Secure Access Service Edge (SASE ) Guide for Leaders

Why SASE? What started out as a temporary business solution to the pandemic is here to stay. ESG’s 2021 SASE Trends report found that 62% of respondents will work remotely or in a hybrid manner. To support this “new normal,” enterprises have adopted the cloud in staggering numbers—98% of respondents stated they use public cloud services. Now, CISOs and security leaders are tasked with securing a growing attack surface in complex, distributed network environments. Users…

Read More

Cyber Insurance Market 2022: FAQs & Updates with iBynd

Cyber Insurance Market 2022: FAQs & Updates with iBynd

Q: What are the most important cyber insurance policy coverages for businesses? Notification and expense coverageAfter customer data is compromised, there are state-regulated notification requirements an organization must follow. Cyber insurance companies help navigate and handle the notifications and expenses associated with them such as hiring a forensics expert to identify the cause of the breach, monitoring the affected individuals’ credit score, and paying costs to restore stolen identities. Business interruptionRemember when Kaseya, a US…

Read More

Well-Architected Framework: Sustainability

Well-Architected Framework: Sustainability

Designing and implementing your business workloads in a public cloud platform such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) can be a challenge. Though the marketing pitch makes it sound as if it is straightforward to deploy and migrate workloads to the cloud, it nonetheless requires a thorough understanding of several factors. This includes how that cloud environment is configured, the platform’s architecture, what services are available, and how you,…

Read More

Lessons from the Russian Cyber Warfare Attacks

Lessons from the Russian Cyber Warfare Attacks

Cyberwarfare tactics may not involve tanks and bombs, but they often go hand-in-hand with real combat. The Russian invasion of Ukraine is a prime example. Before Russian troops crossed the border, Russian hackers had already taken down Ukrainian government websites. And after the conflict started, the hacktivist group Anonymous turned the tables by hacking Russian media to shut down propaganda about the war. In these unprecedented times of targeted attacks against governments and financial institutions,…

Read More

Transport Layer Security (TLS): Issues & Protocol

A Secure Access Service Edge (SASE ) Guide for Leaders

Transport layer security (TLS) is the modern version of the now-deprecated secure socket layer (SSL) protocol. Due to multiple vulnerabilities within SSL, organizations require a more robust protocol to coincide with the increasing number of web-based technologies. For example, unlike SSL, TSL allows you to negotiate encryption on regular ports and protocols such as IMAP and POP. This enables secure communication over a wide range of ports and protocols. This has led to TLS becoming…

Read More

Apply a Zero Trust Security Model to Industrial Control Systems (ICS)

Apply a Zero Trust Security Model to Industrial Control Systems (ICS)

Challenges with applying zero trust Applying zero trust principles comes down to segmenting the network, using authentication technology to verify the requestor before making any service available, enabling secure point-to-point networking, and monitoring device and entity behavior. This breaks down where technological limitations prohibit these capabilities. Sensor ship with a built-in back door. These devices must be calibrated in the field. The engineer installing them sets the operating level when the device is installed. Many…

Read More

Top 5 Infrastructure as Code (IaC) Security Challenges

Top 5 Infrastructure as Code (IaC) Security Challenges

Infrastructure as code (IaC), an essential component of contemporary software, enables developers to spin up software infrastructure while offering systems the ability to grow in a flexible and on-demand manner. Tools that make these configurations based on a programmatic method fall under the category of IaC, including: AWS CloudFormation Azure Resource Manager Helm Charts Progress Chef Puppet Red Hat Ansible Terraform IaC has altered the process of deploying environments for online services and applications. Rather…

Read More
1 8 9 10 11 12 17