Atlassian released a patch for a critical vulnerability in its workspace collaboration tool Confluence stemming from hard-coded credentials. The Australian company found no evidence of exploitation of the flaw that allows remote, unauthenticated attackers access to vulnerable servers.
The basic foundation of designing a reliable and dynamic cyber resilience program is to have an elaborate incident response plan that can take into account different cyberthreat scenarios and outcomes, says Singapore-based Christophe Barel, who is managing director for Asia-Pacific at FS-ISAC.
With dozens of cybersecurity vendors offering solutions, today's zero trust debate is not about whether to do it but rather how to implement it. Some argue that firewalls and VPNs are dead while others caution against cobbling together new solutions. Experts advise to start small - but start now.
How does a zero trust architecture help reduce the risk of remote access to corporate networks? Ajay Kumar Dubey, channel director at Forcepoint, shares his views on why VPNS are no longer relevant. He also discusses implementing SASE and controlling access to cloud and private apps.
Researchers at BitSight say a common GPS tracker used in fleet management by organizations around the globe could be used by hackers to abruptly stop vehicles on highways or disable a car for ransom. Chinese manufacturer MiCODUS hasn't responded to researchers or U.S. officials.
Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.
Cyberattacks aren't just an annoyance but have real-world effects. Case in point: ransomware attacks on Colonial Pipeline and on food processor JBS. IBM Security's Chris McCurdy discusses these developments and security scenarios emerging from the cyber-physical fusion.
Cybersecurity compliance is not the same as security. Recognizing this fact can lead many organizations to prioritize one over the other, thereby increasing critical risks. But by taking a planned approach to integrating the two, you can achieve a holistic solution that delivers both.
A new assessment framework aims to help patients, healthcare providers and others examine the various privacy, security and other risks of digital health technologies, says Tim Andrews of the nonprofit Organization for the Review of Care and Health Applications, which co-developed the framework.
What happens when traditional security methods such as legacy VPNs and firewalls simply aren’t enough to protect employees as they connect to untrusted networks?
Two words that can help prevent unauthorized access and costly breaches as a result. Those words? Zero Trust. A new way of verifying user identities and...
A flaw in Log4j is an "endemic vulnerability," says the Cyber Safety Review Board, a panel of U.S. public and private sector security experts. Despite a flurry of warnings, many systems remain open to hackers exploiting unpatched systems, ensuring that what seemed like a sprint is a marathon.
CISO Richard Rushing of Motorola Mobility says that open-mindedness, innovation and a desire to learn are essential qualities for CISOs in order to build dynamic defense strategies to stay ahead of the attackers. He also discusses why partners are critical components in cybersecurity.
CyberArk has pushed beyond privileged access management to address broader identity use cases as the rise of machine identities creates new challenges. The company will offer more holistic protection to user and nonuser identities by expanding into secrets management and cloud privilege security.
Joshua Schulte now faces a minimum of 80 years in prison after a Manhattan federal jury returned guilty verdicts in all nine counts brought against the former CIA programmer by U.S. prosecutors. Schulte leaked a trove of classified hacking secrets used in espionage.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.