Last updated on April 4th, 2022 at 07:18 pm

 

Automation promotes consistency in API security

Establishing consistency in security protocols is a challenge for any organization developing and implementing APIs. Judicious use of automation can mitigate development delays and facilitate development, as panel discussion showed.

  

Video Byte: Security Service Edge

SASE, CASB, Zero Trust, SSE – confused yet by all the abbrevations and acryonyms? Cybersecurity ist a highly dynamic field, and even the analysts find it hard to keep up.
We asked Mike Schuricht, VP Products at Forcepoint, to shed some light on Security Service Edge and explains its relationship to SASE and some other cybersecurity abbreviations in this Video Byte.

 

How to Strengthen Your Organisation’s Password Hygiene

For organisations, employees neglecting to set strong passwords or having poor password habits can increase vulnerability to its cybersecurity strategy. sing strong passwords for account logins is one of the basic steps, yet time and time again, employees fail to comply with security policies at work.

 

Myths, statistics and holistic security – are insiders the real problem?

A 17-year-old FBI report claimed that 80 per cent of data breaches originate internally. A recent report on Statista, demonstrates that the problem is much more nuanced.

California grant program is a security nightmare

Government’s inability to protect citizen data resulted in at least $36 billion in cyber fraud this year. California may be getting ready to add to that total and setting up small businesses to be hit hard by hackers.

Data Protection Day: Schrems II: The SME dilemma

Data Protection Day is a time to remind organizations across all industries and sizes about the important of data protection. Lately we’ve seen a lot of regulations like the GDPR or Schrems II, all small steps towards a proper data protection to secure personal data and give the topic the deserved recognition.
With the ruling of the European Court of Justice in the Schrems II case, pressure is growing on small and medium-sized companies to re-evaluate their processes and procedures and adapt them to the regulations of the EU GDPR. Mareike Vogt, data protection expert at TÜV SÜD, takes a closer look at this current topic.

Podcast: The hackers won’t let you go. Time to go after them

In cooperation with our correspondent from SIlicon Valley, Lou Covey, Cybersecurity Magazine is pleased to now offer podcasts. In this episode, John Flory III, CISO for Harbor Networks, explains why it is necessary to go on offense with ransomware attacks.

Patience and persistence trump technology in SolarWinds attack

As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth it, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.

A christmas goodie: „Het Virus“ by Eddy Willems

Something unusual for Christmas from Cybersecurity-Magazine: our first book review. “Het Virus” by Eddy Willems and Alain Dierckx.
Happy Holidays from Cybersecurity Magazine!

1 34 35 36 40