Protecting Applications in a Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and depl… Continue reading Protecting Applications in a Serverless Architecture

Protecting Sensitive Data: A Black Swan Never Truly Sits Still

The black swan – a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these nightmares can take the form of disabled critical services such as municipal electrical grids and o… Continue reading Protecting Sensitive Data: A Black Swan Never Truly Sits Still

How useful is the default configuration of ModSecurity for a generic web application?

Scenario:

ModSecurity with a “default” or “generic” configuration (like the one that might be provided by shared hosting providers, for example).
Generic web application (custom, uncommon, or unknown), for which specific ru… Continue reading How useful is the default configuration of ModSecurity for a generic web application?

Are Your Applications Secure?

Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report.  As we close out a year of headline-grabbing data breaches (British Airways, Under Armor,  Panera Bread), … Continue reading Are Your Applications Secure?

Everything You Need to Know About Azure Infrastructure – September 2018 Edition

Septemeber was full of Azure announcements from Ignite, Aidan breaks all the news down so that it is easier to digest.

The post Everything You Need to Know About Azure Infrastructure – September 2018 Edition appeared first on Petri.

Continue reading Everything You Need to Know About Azure Infrastructure – September 2018 Edition

Protecting Sensitive Data: The Death of an SMB

True or False? 90% of small businesses lack any type of data protection for their company and customer information. The answer? Unfortunately true. Due to this lack of care, 61% of data breach victims are specifically small businesses according to ser… Continue reading Protecting Sensitive Data: The Death of an SMB

Rick Holland, Digital Shadows – Enterprise Security Weekly #104

Rick Holland has more than 15 years’ experience working in information security. Paul and John talk to Rick about vulnerability management, WAFs, and advice to enterprise marketing. Full Show NotesVisit http://securityweekly.com/esw for all the l… Continue reading Rick Holland, Digital Shadows – Enterprise Security Weekly #104