Making the Case for Network Segmentation in AWS

Reading Time: 4 minutes Network segmentation, a concept that dates back to the start of enterprise IT systems, is now a routine part of building data centers and application architectures.

The post Making the Case for Network Segmentation in AWS appeared first on Security Intelligence.

Continue reading Making the Case for Network Segmentation in AWS

Finding New Approaches to Web Application Security

Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.

The post Finding New Approaches to Web Application Security appeared first on Security Intelligence.

Continue reading Finding New Approaches to Web Application Security

Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

Could critical infrastructure attacks be making a comeback? Or did these invisible threats never leave in the first place? Extensive research reveals that as many as four threat actors many have been involved in creating Stuxnet, the sophisticated… Continue reading Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.

The post Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems appeared first on Security Intelligence.

Continue reading Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

Imperva Makes Major Expansion in Application Security

When Imperva announced in 2018 it would acquire the application security solution provider Prevoty, a company I co-founded with Julien Bellanger, I knew it would be a win-win for our industry. Prevoty’s flagship product, Autonomous Application Pr… Continue reading Imperva Makes Major Expansion in Application Security

How Nat Prakongpan Found His Home on the Cyber Range

Nat Prakongpan was building enterprise networks for his school in Thailand in the seventh grade. Following a series of happy accidents, he found himself building an immersive cyber range for IBM.

The post How Nat Prakongpan Found His Home on the Cyber Range appeared first on Security Intelligence.

Continue reading How Nat Prakongpan Found His Home on the Cyber Range

Deciphering the Encryption Paradox

The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.

The post Deciphering the Encryption Paradox appeared first on Security Intelligence.

Continue reading Deciphering the Encryption Paradox

Why You Need a BGP Hijack Response Plan

BGP hijack attacks are increasing in popularity, but are still largely unaddressed in many organizational incident response plans.

The post Why You Need a BGP Hijack Response Plan appeared first on Security Intelligence.

Continue reading Why You Need a BGP Hijack Response Plan

5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

These five retail cybersecurity tips will help organizations mitigate cyberattacks and provide customers with the safest shopping experience during the holiday season.

The post 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays appeared first on Security Intelligence.

Continue reading 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud

Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.

The post Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud appeared first on Security Intelligence.

Continue reading Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud