There is a firmly held concern in security circles that the automation associated with DevOps moves too swiftly, that security teams and their tests can't keep up, that too many of the metrics measured focus on production, availability, and compliance checkboxes, and as a result, security falls to the wayside.
George V. Hulme |
01 May |
Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.
Ellen Messmer |
08 Aug |
Increasingly, businesses accept the idea that employees should be able to <a href="http://www.networkworld.com/columnists/2011/072711-andreas.html?hpg1=bn">use their personal mobile devices</a>, such as <a href="http://www.networkworld.com/slideshows/2010/061510-smartphone-history.html">smartphones</a> and tablets, for work. But debate is raging as to whether these employee-owned devices should be <a href="http://www.networkworld.com/news/2011/061511-smartphones-tablets-security.html">managed and secured</a> exactly as corporate-owned devices might be.
Ellen Messmer |
28 Jul |
Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job. With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet. In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.
Rodney Gedda |
20 Jan |
Contributions from free and open software makers can be found throughout the tech world. From your datacenter to the desktop and everywhere in between; there's an open solution to your computing needs. This is no less true in information security. My focus in this article is the several outstanding information security desktop tools that personify the innovation and ingenuity of the FOSS (Free and Open Source Software) world. Please keep in mind that all of these applications (except one) are cross-platform so you can find appropriate versions on whatever you run (BSD, Mac OSX, Linux or Windows). The examples herein, however, will be catered to the largest install base (statistically): Microsoft Windows.
Joseph Guarino |
01 Apr |
More Application Security features
Consumer demand for anytime, everywhere services has resulted in over half of all transactions now coming from mobile devices.
Vanita Pandey |
20 Mar |
Every day financial services organisations deal with hundreds of thousands of indicators that could evolve into a cyber incident. According to the Australian Prudential Regulation Authority, Australian financial institutions are among cyber criminals’ top targets, and the threat is accelerating.
Sam O’Brien |
19 Mar |
With the Notifiable Data Breaches (NDB) scheme now in effect, organisations turning over $3 million or more – or any organisation handling health, credit reporting or Tax File Number data – may be feeling less comfortable about their information security.
Andrew McAllister |
15 Mar |
The new data breach legislation which came into effect in Australia recently means that every ‘sizeable’ organisation must comply or risk crippling fines of up to $2.1 million With cybercrime and ransomware attacks on the rise, it’s not a question of ‘if’ a data breach is going to happen, it’s ‘when’ and how quickly your organisation can get back up and running following the event.
Andrew Martin |
14 Mar |
As an incident response (IR) professional, investigating data breaches has introduced me to many new people but it is never under the best circumstances.
Mark Goudie |
14 Mar |
More Application Security opinons