Five critical cloud security challenges and how to overcome them

Today’s organizations desire the accessibility and flexibility of the cloud, yet these benefits ultimately mean little if you’re not operating securely. One misconfigured server and your company may be looking at financial or reputational d… Continue reading Five critical cloud security challenges and how to overcome them

Qualys Multi-Vector EDR: Protection across the entire threat lifecycle

Traditional endpoint detection and response (EDR) solutions focus only on endpoint activity to detect attacks. As a result, they lack the context to analyze attacks accurately. In this interview, Sumedh Thakar, President and Chief Product Officer, illu… Continue reading Qualys Multi-Vector EDR: Protection across the entire threat lifecycle

How to drive business value through balanced development automation

Aligning security and delivery at a strategic level is one of the most complex challenges for executives. It starts with an understanding that risk-based thinking should not be perceived as an overhead or tax, but a value added component of creating a … Continue reading How to drive business value through balanced development automation

How do I select a password management solution for my business?

91 percent of people know that using the same password on multiple accounts is a security risk, yet 66 percent continue to use the same password anyway. IT security practitioners are aware of good habits when it comes to strong authentication and passw… Continue reading How do I select a password management solution for my business?

Facing gender bias in facial recognition technology

In the 1960s, Woodrow W. Bledsoe created a secret program that manually identified points on a person’s face and compared the distances between these coordinates with other images. Facial recognition technology has come a long way since then. The field… Continue reading Facing gender bias in facial recognition technology

A 2020 approach to security: People matter

The information security industry frequently utilizes the phrase “people, processes and technology” (PPT) to describe a holistic model of securing the business. But though this phrase is repeated ad nauseum, we seem to have forgotten one of those three… Continue reading A 2020 approach to security: People matter

Three places for early warning of ransomware and breaches that aren’t the dark web

For better or worse, a lot of cybercrime sleuthing and forecasting tends to focus on various underground sites and forums across the deep and dark web corners of the Internet. Whenever a report cites passwords, contraband or fraud kits trafficked in th… Continue reading Three places for early warning of ransomware and breaches that aren’t the dark web

ERP security: Dispelling common misconceptions

Enterprise resource planning (ERP) systems are an indispensable tool for most businesses. They allow them to track business resources and commitments in real time and to manage day-to-day business processes (e.g., procurement, project management, manuf… Continue reading ERP security: Dispelling common misconceptions

Protect your organization in the age of Magecart

The continuing wave of attacks by cybercriminal groups known under the umbrella term Magecart perfectly illustrates just how unprepared many e-commerce operations are from a security point of view. It all really boils down to timing. If the e-commerce … Continue reading Protect your organization in the age of Magecart

Know the threats to mobile security

Where there’s money, there’s also an opportunity for fraudulent actors to leverage security flaws and weak entry-points to access sensitive, personal consumer information. This has caused a sizeable percentage of consumers to avoid adopting… Continue reading Know the threats to mobile security