The security dilemma of data sprawl

As hybrid work becomes the norm in business, so does data sprawl. Data sprawl refers to the spread of company information to various places, which often comes from dispersed and unmanaged cloud app use. In fact, within businesses worldwide, 1 in 5 employees use personal apps to upload, create, share, or store sensitive information, which […]

Continue Reading

6 key challenges technologists are facing today

Every organization that interacts with customers or consumers via web and mobile applications, and also as they transition to a hybrid workspace, means that they are interacting with more tools, cloud services, on-prem services, SaaS tools and interfaces. This creates a challenge for IT professionals to be able to provide a top-notch experience that the […]

Continue Reading

The top apps for malware downloads

In July 2022, one third of all malware downloads came from cloud apps. The overwhelming majority of the downloads were trojans, a type of malware that is disguised as legitimate software. If you were to download and run a trojan, you would typically end up infected with other malware such as info stealers, backdoors or […]

Continue Reading

Why are current cybersecurity incident response efforts failing?

Business-critical applications, such as enterprise resource planning (ERP) systems provided by SAP and Oracle, are considered the crown jewels of the enterprise. These assets hold an organization’s most valuable data: from confidential financial information to private customer and partner details. Attackers that gain access to these applications can cause mass destruction, by hijacking an organization’s […]

Continue Reading

Mastering microsegmentation for enterprise applications

Network segmentation is one of the defensive practices used by many enterprises to stop the spread of malware in the ecosystem. Servers and databases are grouped together by using network switches or firewall appliances, and separation is achieved based on the application requirements. Network segmentation provides very rudimentary control over the malware. Typically the network […]

Continue Reading

81% of codebases contain known open source vulnerabilities

Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and highlights trends in open source usage within commercial and proprietary applications and provides insights to help developers better understand the interconnected software ecosystem. The report also details the pervasive risks posed […]

Continue Reading

The price of an accelerated digital transformation

F5 announced a report which shows the challenges organizations face as they transform IT infrastructures to deliver and secure digital services that have become inseparable from everyday activities, such as completing job tasks or consulting a doctor. With highly distributed architectures and a broader threat landscape resulting from an ongoing digitization of previously physical experiences, […]

Continue Reading