The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.
Human error looks to be the obvious culprit in an accidental data breach by Britain's Cabinet Office, which published the home addresses of celebrities such as Elton John and Olivia Newton-John when it released a list of individuals set to be recognized for their contributions to British society.
Apple and Google have stopped distributing a popular messaging app marketed to English and Arabic speakers called ToTok. The New York Times has reported that U.S. intelligence agencies believe ToTok was developed by the United Arab Emirates government to spy on its citizens. The government bans rival offerings.
11 Best Practices to Minimize Risk and Protect Your Data
By now, we are all too aware of the consequences of a data breach:
Loss of customer confidence
Potentially costly litigation
However, most organizations are not as familiar with how to prevent these attacks. They still spend...
Cyberattacks and data breaches cost the global
economy trillions of dollars annually, with some
forecasts estimating as much as $6 trillion annually by
To truly slow hackers down -- and to prevent
as much damage as possible before it ever happens
-- a more proactive approach to security is...
With the goal of becoming an international university XJTLU needed to ensure that their website was high performing and available for users anywhere in the world. However, with infrastructure focused on campus, access to XJTLU's site was intermittent and slow for off campus users. This poor performance was magnified...
Application-level visibility is a must-have to ensure service quality, end-user experience and performance as well as to reduce security risk.
Download the EMA report, "Understanding the Value of Application-Aware Network Operations" to learn more about the benefits of true application visibility needed for...
Deception technology has emerged as a hot practice - but not one that is necessarily on every enterprise's budgeting radar. Don Gray, CTO of PacketViper, talks about the emergence of deception technology and how security leaders can make the case - and find the budget - for its usage.
Identify and Block Unwanted Apps
Traditional app control is failing to do its job. Most modern firewalls are unable to see almost half of all network traffic, leaving parasitic apps to run unseen and unchecked. These apps steal resources, slow down legitimate activities and create security and compliance...
Complex configurations don't mix well with rapidly spun-up components, and when your company uses multiple cloud providers to host your critical assets, the odds of a major security event get that much higher.
So how do you close visibility gaps and integrate conflicting datasets from different providers, and how...
A flood of new technology is racing toward the financial services industry - most notably, increased automation for internal processes to improve margins, as well as the development of new software to create a complete and seamless customer experience in traditional, online, and mobile banking.
A complete list of mobile app security testing requirements, right at your fingertips.
Download this white paper and to learn more about covering your bases with the answer to these three key questions:
What types of testing are necessary?
What are all the areas of coverage?
What additional requirements does...
We frequently talk to enterprise leaders tasked with implementing the right mobile app security testing solutions. Choosing the right solution depends on how many apps your organization develops, how frequently you push updates to those apps, how often you plan to test those apps, and what mobile app security metrics...
Did you know that public exploits for business applications have increased 100 percent since 2015? Today, over 77 percent of the world's transactional revenue touches an ERP system, making these applications an attractive target for cyber criminals looking to profit from the highly-sensitive and regulated data that...
A vulnerability in global airline check-in software used by 500 airlines could have been exploited to download other individuals' valid boarding passes, potentially giving them access to restricted airport spaces, warns security expert David Stubley. The flaw in Amadeus travel software has now been fixed.