The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.
The two words that IT and MSP teams never want to hear are “data loss.” According to Business Partner Magazine’s article on data backup, “94% of companies that fail to recover from a major data loss do not survive, and 43% of companies never resume their operation after a major data loss event.” To prevent these disasters from occurring, IT & MSP teams rely on data protection.
Splunk embodies the top 5 principles of unified security and observability, and has been an expert in log management, security, and observability for years.
To minimize the security risks of an application, developers need their apps to stand up to stringent security testing. Fortunately, there are tools available that simplify and even automate these security tests. There are also best practices to guide and inform the testing process. In this article, I will cover the most common security issues for mobile apps and highlight popular security tests.
IBM this week announced patches for high-severity vulnerabilities in IBM MQ, warning that attackers could exploit them to bypass security restrictions or access sensitive information. Messaging and queuing middleware, IBM MQ provides enterprise-grade messaging between applications, enabling the transfer of data between programs and the sending of messages to multiple subscribers. Two security issues were resolved in IBM MQ this week, both residing within the libcurl library.
From surprise zero-day vulnerabilities to new exploits surfacing in the wild, few things ruin an IT security analyst’s after-hours or vacation plans faster than having to work overtime because of a cyberattack. Here’s a glimpse into how the story usually goes at most companies: A horribly bad cybersecurity day The first cup of morning coffee or tea is on your desk.
As more workloads move to the cloud, more employees work remotely and SaaS application adoption increases, enterprises have had to rethink the way they secure access to the IT services their employees need. The reality for most enterprises today is a multi-vendor, siloed approach that has only compounded their security and IT operations management headaches as they end up using multiple management tools to secure and govern their access to cloud services.