Issue highlights 1. Another day another Wordpress 0-day 2. SendGrid customers told to reset passwords and DKIM keys after breach 3. Zombie apps haunt BYOD workplaces 4. A post-RSA Conference recap 5. IDG Contributor Network: Identity as an attack surface 6. IDG Contributor Network: The hardware roots of trust 7. IT careers: Security talent is red-hot 8. 6 hard truths security pros must learn to live with 9. Boards are on high alert over security threats |
Resource compliments of: Skyhigh Networks Based on Gartner's framework for managing cloud security, this eBook provides IT and Security teams with step-by-step checklists for managing the cloud security lifecycle. Whether you're just starting to define processes and policies, or reviewing an existing framework, this guide will get you started with best practices and useful action items. Download the guide for a breakdown of cloud security best practices, key requirements for enabling secure shadow IT usage, checklists for ensuring data security & compliance, criteria for evaluating CASB vendors, and more! |
READ MORE |
SendGrid, a Boulder, Colorado-based transactional and marketing email delivery service, has urged customers to reset passwords after an internal investigation discovered that an employee's credentials were compromised. READ MORE |
According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no longer supported. READ MORE |
|
Default credentials: Ignored by those who should be paying attention, and collected by everyone else, they're the reason most breaches don't need to be too technical. READ MORE |
Mobile computing, cloud apps and tele-working have effectively made the de-perimeterization of IT security a "fait accompli". In the process, these redrawn battle lines have created new challenges for CSOs and new points of entry for attackers. Chief among these is user identities. This article examines the emerging concept of identity as an attack vector, what risks it poses to enterprises and what changes are needed to mitigate the threat. READ MORE |
With recent revelations that some chip manufacturers are working with National Security Agency (NSA) to insert backdoors and cryptographic weaknesses into their products, what due diligence should be done to ensure hardware security? Is hardware still a better option than software encryption? READ MORE |
Webcast: Rimini Street New innovation and updates in core ERP lag as SAP focuses all its attention on a long-term, high-risk "re-platform" strategy with its newly announced S/4HANA suite. Join us on May 14th at 1:00 p.m. EST for a live discussion and expert insight. Learn More |
Security pros are in high demand, and companies are willing to pay top dollar for the right candidates. Do you have what it takes to succeed on the infosec career track? READ MORE |
Caveat emptor: Security solutions will always fall short in addressing the fundamental flaws of securing IT systems READ MORE |
Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company's security posture and steer the conversation toward managing business risk. READ MORE |
White Paper: Imperva Firewalls don't provide sufficient protection for most public-facing websites or Web applications. Learn how Web App Firewalls help security leaders better protect data and apps in their organizations. View now |
|
0 comments:
Post a Comment