Organizations prioritize strategic security programs, but lack fundamentals

Organizations are prioritizing strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture, a ReliaQuest and Ponemon Research survey reveals. Among the roadblocks to achieving a risk-oriented posture are ineffective security metrics, operational inefficiencies, and the lack of full visibility across their dynamic IT environment. “This research […]

Continue Reading

OSI Layer 1: The soft underbelly of cybersecurity

As traditional cybersecurity solutions improve, they push cyberattackers toward alternative paths. Layer 1 of the OSI model (i.e., the physical layer) has become a fertile ground for attacks and, effectively, the soft underbelly of cybersecurity. What forms do attacks on the hardware level take? Cyberattacks on the physical, hardware level happen when, for instance, a […]

Continue Reading

Top tips for preventing SQL injection attacks

In the wake of the Colonial Pipeline attack and other high-profile cases, IT teams may be scrabbling to shore up their endpoint protection. But those in the developer community know security weaknesses don’t begin and end there; write code improperly or with insufficient security, and you’re also coding in future web attacks. Web vulnerabilities are […]

Continue Reading

82% des entreprises européennes augmentent leurs budgets de sécurité “Zero Trust” pour s’adapter au nouveau monde du travail

La nouvelle étude d’Okta révèle que l’essor du télétravail a accéléré l’adoption de l’approche Zero Trust, même si la majorité des entreprises continuent encore de se fier aux mots de passe. The post 82% des entreprises européennes augmentent leurs budgets de sécurité “Zero Trust” pour s’adapter au nouveau monde du travail first appeared on UnderNews. […]

Continue Reading