days
0
-24
-1
hours
-2
0
minutes
-4
0
seconds
-3
-6
search

#security

Upgrading remote access to the modern era

How ZTNA and SDP are becoming the gold standard in secure remote access

VPN services still use concepts based on software from the mid-1990s. However, zero-trust network access (ZTNA) reflects modern security sensibilities. A network designed to conform to ZTNA standards represents a complete rethinking of how network security functions. Unlike a VPN, ZTNA networks treat all users, internal or external, the same.

Guiding product managers

Security engineering: Glide path for software products

How can you identify security engineering for the end state of your project? A product manager needs to answer the following questions: – What is the right security engineering end state for me? What is the minimum? When should I stop? This article explores security engineering, investing in security compliance, and the journey to reaching maturity.

Making a disaster recovery plan

Data recovery: What matters when disaster hits

Did you know: Almost 40 percent of small businesses never reopen following a natural disaster. All businesses, large and small, should have a data recovery plan in case disaster hits, whether that disaster is a flood or accidentally deleting critical code. Here’s what to anticipate when disaster strikes, and how to start preparing a solid recovery plan.

Fortifying mobile apps

App shielding vs. bug bounty programs: In pursuit of fortified mobile applications

Make no mistake, all software has bugs; the industry standard ranges from 15 to 50 errors per 1,000 of code. Code review and bug bounty programs cannot find all of them. For better security against vulnerabilities, companies should add a layer of protection with app shielding. App shielding is an approach to application security using a three-pronged approach.

Be brave, stay secure.

Is your browser tracking you? Brave and Mozilla Firefox offer privacy solutions

What browser do you use? Depending on your browser choice, websites may be tracking you wherever you go online. Popular websites can include up to 24 pieces of tracking content from companies such as Facebook and Google. In the fight for Internet security, both Brave and Mozilla Firefox offer free to use solutions. We go over some of the benefits of both browsers.

Keeping secrets under lock and key

HashiCorp Vault 1.3 adds new debugging command & more

HashiCorp Vault is focused on security, secret keeping, data encryption, and identity management. It keeps all your sensitive data, including API keys, passwords, and certificates, under wraps. Version 1.3 has now released to the public. Check out all the new updates made to HashiCorp vault, including some beta improvements, a new debug CLI command, and two new features just for Vault Enterprise.

Spinning order out of chaos

Is chaos engineering the key to lockdown cybersecurity?

The practice of chaos engineering can help unearth security problems that ordinarily, you would never discover. By utilizing chaos engineering best practices, your teams can keep up with how a potential hacker might infiltrate your network and gain a better understanding of the weaknesses in your infrastructure and what security measures to take.

Is your IoT fish tank secure?

Are there any real security threats to sensor-generated data?

IoT devices can be a weak leak and expose data to hackers. Businesses should be aware of the risks that can occur if attackers get their hands on data, and keep up with security updates and testing. How can hackers compromise sensor-generated data, and what are the best practices for IoT device security?

Keeping up with security

How AI assists in threat analytics and ensures better cybersecurity

As technology advances, users should keep up and evolve their security to stay one step ahead of hackers. AI software helps in threat analytics and ensures better cybersecurity and machine learning can help detect threats earlier. In this article, find out how AI can be used to help with security, and why it is perfect for the job.

Preventing man-in-the-middle attacks

TLS certificate pinning on mobile apps to secure from MiTM attacks

Mobile security has become more important than ever, especially as many employers adopt Bring Your Own Device for remote and in-house employees. What is TLS certificate pinning? Find out all about it and how to implement TLS pinning on Android and iOS apps and prevent man-in-the-middle (MiTM) attacks on mobile apps.