Compliance with the new privacy rules doesn’t always fall on data center managers, but when it does, it’s more difficult than it may sound.
Executive management anxiety over the California Consumer Privacy Act will rise as the enforcement deadline looms. Security managers will need to know the answers to these questions.
If the industry doesn’t formulate a set of standards for securing critical infrastructure, regulators might.
As Microsoft prepares to end support for the widely installed OS, here are the key security considerations.
The firewall is dead, and zero trust is here to replace it. But Google’s BeyondProd is only one way to skin the zero-trust cat.
The attack was limited to its managed services business in a single New York data center, the company said.
Seeing its firewall sales softening, the security vendor makes another acquisition to reorient itself for the cloud era.
Based on the secure chip in Pixel phones, the recently open sourced project holds promise for data center hardware.
APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.
Legacy applications can leave massive security holes and must be dealt with, no matter how critical they are.
For businesses that operate in the European Union, complying with GDPR has to be a top priority. In many of these organizations, the burden is falling on the data management staff.
While experts aren’t surprised, they recommend adding the latest tools to your security strategy now.
White hat hackers can be extremely useful, as long as you stay within certain guardrails.
APIs make for a more feature-rich and dynamics world of applications, but they also increase attack surface.
Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making the same mistake.