In the security world, no news is good news. But success on the job for the Chief Information Security Officer (CISO) can be a double-edged sword. When everything is going right, it can be easy to forget all that goes into keeping threats at bay. And that’s precisely when vigilance within the organization can...
In March 2024, a database containing the personal information of 442,519 Life360 customers was leaked, one of many recent data breaches attacking API vulnerabilities.
API’s are frequently embedded in backend framework for mobile and web applications, therefore a common area for hackers to target. How can an...
European financial institutions are striving to deliver seamless & secure online experiences through advanced web applications and APIs. Automation, particularly in the form of bots, plays a pivotal role in streamlining operations, enhancing user interactions, and driving efficiency across the board.
However, the...
The state of security is highly adrenalized these days — more so than usual. Years into the deadly and disruptive global pandemic, not only are we still seeing more attacks, we’re also seeing more breaches, as the way many of us work continues to evolve.
New global research conducted by Splunk and the Enterprise...
Enterprise Strategy Group (ESG) conducted an Economic Validation to measure the expected savings and benefits of implementing Splunk Security. By combining Splunk’s security information and event management (SIEM) and security orchestration, automation and response (SOAR) capabilities and workflows into a simplified...
Web applications and APIs of today have empowered companies to create lightning-fast online experiences, revolutionizing user engagement and satisfaction. Developers benefit from automation and scripting to enhance productivity, search engine optimization, and resource management efficiently.
However, these same...
A resolute and dependable enterprise data backup and recovery strategy is essential when faced with data loss. With advanced persistent threats (APTs) targeting backup data more than ever before, ransomware attacks continue to penetrate multiple layers of security, successfully capturing organisations’ data.
View...
What is the NIS2 Directive and how will it tighten security controls for critical infrastructure?
This guide contains advice from a CISO on where adapt and strengthen your cyber capabilities in preparation for NIS2. It also contains information on:
The 5 pillars of NIS2 and how do they transform technology and data...
Bradon Rogers, chief customer officer at Island, details how traditional browser frameworks amplify security risks. His approach challenges the status quo, suggesting that browsers can be more than just potential liabilities. They can be assets for enterprise environments.
Enterprises have deliberated on implementing zero trust for years, but vendors are overpromising and under-delivering on zero trust solutions. Gartner Vice President Analyst John Watts discusses the current adoption status and misunderstandings surrounding the framework.
As security and technology leaders look to reduce the complexity of their environments and condense the number of core vendors in their ecosystems, the power of platform solutions grows. John Maddison of Fortinet opens up on the power of convergence in a single operating system.
Navigating the crowded GRC vendor market is complicated and time-consuming – there are lots of requirements to meet and lots of vendors to sort through. Consistently and efficiently evaluate your vendor shortlist across five categories and dozens of weightable features and capabilities with our GRC Buyer's Guide.
...
Market trends (Rise in AI crime, growth in mobile device usage, MFA) and new legislation (NIS2, DORA) have raised the importance of providing the highest level of workforce authentication within many leading businesses. As hackers get more sophisticated, providing a secure, user friendly solution for employees is key...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.