Latest Security Opinions
The spread of this easily accessible Wi-Fi has enabled people on the move to do everything from check their emails to watch videos online. But users should log into these services with caution as malicious actors regularly attempt to steal sensitive data through unsecured connections.
Keyloggers are designed to track successive keystrokes made on a keyboard and generally operate without the device user being aware.
hile technology clearly has a critical role to play in stopping attacks from being successful, providing employees with the know-how and understanding of the threats they face is vital.
Gaining a complete view of what data is stored in the cloud, who is using it and where it is being accessed can be vital in uncovering the presence of malicious actors.
Do you know how many people have access to your businesses core systems? Chances are it’s more than you think, and the bad news is that every one of them represents a potential entry point for cybercriminals.
Adopting a Zero Trust mindset means organisations are able to ditch the outdated ‘trust but verify’ approach and instead embrace a ‘never trust, always verify’ security stance, and ensures organisations stay ahead of the security curve.
Those doing these early cybersecurity jobs ended up knowing a bit about everything and evolved into generalists. Since then, with so many new avenues of technology, most of these generalists either specialised or went into management. New recruits don’t have time to acquire the historical knowledge of generalists
False positives are a symptom of a problem, not the cause Security ‘alert fatigue’ is a real issue. According to a recent report from the SANS Institute, alert fatigue is one of the biggest barriers to retaining top security talent. Many of the most common security tools, including security incident and event management (SIEM) tools… Read More
Building a resilient defense against ransomware is becoming a ‘must-have’ for any organisation that takes the risks seriously and wants to protect its IT ecosystem from the downtime, disruption, and cost that frequently come with ransomware infections.
However powerful your leadership, however large your organisation, however advanced your systems and however well trained your personnel, the success or failure of your critical systems can be decided in one small “go or no go” moment
Essential guidance for keeping software truly secure A lot has been said about DevSecOps from experts, practitioners, pundits and vendors. However, recommendations that start and finish with securing code leave critical gaps. In order to keep software secure, businesses must go beyond just securing the code they are developing to also secure the pipeline that delivers that… Read More
Collectively we have a responsibility to ensure digital identity technologies are truly inclusive and don’t exclude or misrepresent the underrepresented, writes Cindy White, CMO, Mitek.