Behavior Transparency: Where Application Security Meets Cyber Awareness

How can you tell when software is behaving strangely if you don’t know what the right behavior is? That’s an important question when it comes to threat actors. After all, attackers often hijack honest software, networks and systems for dishonest ends. To stop them with security tools, the first step must be to have great […]

The post Behavior Transparency: Where Application Security Meets Cyber Awareness appeared first on Security Intelligence.

Continue reading Behavior Transparency: Where Application Security Meets Cyber Awareness

AWS S3 can be a security risk for your business

Along with the shift to the cloud and emergence of modern digital services and applications, new security concerns have emerged for organizations. More connectivity means more risk, and the greater the risk, the more protection is needed. As the use of… Continue reading AWS S3 can be a security risk for your business

92% of pharmaceutical companies have at least one exposed database

Reposify released its Pharmaceutical Industry Attack Surface Exposures Report examining the security posture of the world’s leading pharmaceutical companies. The report analyzed eighteen leading pharmaceutical companies and their nine hundred plus subs… Continue reading 92% of pharmaceutical companies have at least one exposed database

Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness

Security professionals keep busy. Before you can patch a vulnerability, you need to decide how important it is. How does it compare to the other problems that day? Choosing which jobs to do first using vulnerability management tools can be a key element of a smart security strategy. Software vulnerabilities are one of the root […]

The post Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness appeared first on Security Intelligence.

Continue reading Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness

IBM Security Guardium Named Industry Leader for Third Consecutive Time

KuppingerCole named IBM Security Guardium an overall business leader in their Leadership Compass on Database and Big Data Security Solutions. IBM was also again ranked as a leader in all three sections: product, innovation and market. With this in mind, take a look at how KuppingerCole measures today’s solutions and why good data security is so important. […]

The post IBM Security Guardium Named Industry Leader for Third Consecutive Time appeared first on Security Intelligence.

Continue reading IBM Security Guardium Named Industry Leader for Third Consecutive Time

Open source security, license compliance, and maintenance issues are pervasive in every industry

Synopsys released a report that examines the results of more than 1,500 audits of commercial codebases. The report highlights trends in open source usage within commercial applications and provides insights to help commercial and open source developers… Continue reading Open source security, license compliance, and maintenance issues are pervasive in every industry

Database encryption: Protecting the crown jewels

Databases are the lifeblood store of information for every organization. Without them, the organization’s efficiency, productivity and scope to prosper would be curtailed severely. Protecting the company crown jewels is something that most organization… Continue reading Database encryption: Protecting the crown jewels

Dark web analysis shows high demand for hackers

Positive Technologies’ experts have analyzed the ten most active forums on the dark web, which offer services for hacking websites, buying and selling databases, and accessing web resources. The research found that in the vast majority of cases on thes… Continue reading Dark web analysis shows high demand for hackers

Ubiquiti warns customers about potential data breach

American networking tech vendor Ubiquiti is asking customers to change their password because of unauthorized access to some of their information technology systems hosted by a third party cloud provider. They did not specify the cloud provider that ho… Continue reading Ubiquiti warns customers about potential data breach

With database attacks on the rise, how can companies protect themselves?

Misconfigured or unsecured databases exposed on the open web are a fact of life. We hear about some of them because security researchers tell us how they discovered them, pinpointed their owners and alerted them, but many others are found by attackers … Continue reading With database attacks on the rise, how can companies protect themselves?