Is your organization getting physical security right?

For most organizations (and especially for tech companies), the physical security of data centers and headquarters is of the utmost importance. As Tim Roberts, a senior security consultant with NTT Security’s Threat Services group, duly points ou… Continue reading Is your organization getting physical security right?

Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

The majority of companies in the United States and Europe are required to comply with at least one IT security regulation – often times more. This forces companies to exert strong control over how data is transferred, accessed and maintained throughout… Continue reading Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

Framing supply chain attacks

The increase in the demand for innovative software has effectively reshaped the software development industry itself. Today, speed and agility are paramount and development teams are pushed to deliver highly advanced applications in record time — which… Continue reading Framing supply chain attacks

Perimeter solutions: Do layers of security make a difference?

As an enterprise, it is always important to constantly reevaluate information security solutions. When doing so, take a good look at the perimeter solutions in place and their associated detection mechanisms. What’s interesting is that many vendors tha… Continue reading Perimeter solutions: Do layers of security make a difference?

Securing your app and driving down call center fraud

In this Help Net Security podcast, Angie White, Product Marketing Manager at iovation, talks about how optimizing the customer journey through your mobile app can help you optimize your call center. Here’s a transcript of the podcast for your convenien… Continue reading Securing your app and driving down call center fraud

April Patch Tuesday Forecast: Be aware of end-of-service issues and browser exploits

April Patch Tuesday is nearly here with two significant topics of concern. The first relates to end-of-service milestones and the second issue is browser exploits. Let’s start with end-of-service. This is a fitting topic this month given we have two Wi… Continue reading April Patch Tuesday Forecast: Be aware of end-of-service issues and browser exploits

WHOIS after GDPR: A quick recap for CISOs

2018 was a big year for data protection with the implementation of the General Data Protection Regulation (GDPR) last May — forcing CISOs and other professionals to rethink how the personal data of European consumers should be collected and processed. … Continue reading WHOIS after GDPR: A quick recap for CISOs

The security challenges that come with serverless computing

Serverless computing (aka Function-as-a-Service) has been a boon to many enterprises: it simplifies the code development and deployment processes while improving utilization of server resources, minimizing costs and reducing security overhead. “S… Continue reading The security challenges that come with serverless computing

To DevSecOps or not to DevSecOps?

Would your organization benefit from introducing DevSecOps? Dan Cornell, CTO of application security company Denim Group, believes that most organizations would. With one caveat, though: they must realize that the transition is, first and foremost, cul… Continue reading To DevSecOps or not to DevSecOps?

Digital transformation goes hand-in-hand with Zero Trust security

Forward-looking organizations are investing in Zero Trust security and strong MFA, modern app development, IaaS, and digital transformation, a recently released Okta report has shown. Current situation and expectations Based on the answers by 1,050 IT,… Continue reading Digital transformation goes hand-in-hand with Zero Trust security