Why Application Flow Maps Are the Coolest Feature in Application Security

Application flow maps are the cool feature you can use to discover that needle in a haystackhow does my running app work and what does my app connect to?

How Can Enterprise Teams Understand Application Flows?

Developers will often architect systems that cater only to business requirements and skip identification of security threats and vulnerabilities until later on when it's much more costly. Enterprises can improve overall protection and understand app flows by gathering an accurate asset inventory with connection discovery—basically mapping out your running apps and data flow—and along the way help reduce developer remediation times, security response efforts, and avoid the many costs associated with breach events.

State-Of-The-Art AppSec Goes Beyond Perimeter Into Application Runtimes

When it comes to protecting running applications, traditional defenses that sit on the perimeter lack effective visibility and context to keep pace with attacks. Simply guessing as to the validity of a threat is not enough. This blog spells out five key application security (AppSec) benefits that perimeter web application firewalls (WAFs) can never deliver.

Perimeter Defense Is Too Far Away—and Incurs Significant OpEx  

In recent years, network protection has moved closer and closer to the application, from network firewalls to intrusion detection, and from prevention systems to the WAF. The problem is that these protections are not actually close to the application but rather remain on the perimeter, separated from the assets and systems they are intended to protect. Indeed, the proximity of protection to an application, the stability of the protected application, and the security tools used strongly correlate to the required amount of operational effort, operation cost, and overall protection accuracy. More effort and cost are required with less protection potential the further away from the application you go.

COVID-19 Creates Fresh Cyber Security Challenges as Employees Work From Home

The Threat

The recent surge in Work-From-Home, triggered by the COVID-19 crisis, is here to stay and the first sign of it is that "WFH" has been added to the alphabet soup of jargons crowding the technology industry. WFH, however, has also created a fresh set of challenges for organizations to protect their intellectual assets from cyberattacks. It’s a no-brainer to say that our home networks are far more vulnerable than enterprise networks. Companies are leveraging this crisis to meet immediate needs as well as for building more lasting, longer-term access to a variety of resources in the cloud as well as in the enterprise data center.

As the world logs on to enterprise networks from home, the demand for more secure remote access for employees is at an all-time high. Organizations must prepare for possible cyberattacks on our home IT networks to exploit its vulnerabilities. They need to monitor IT use for signs of malicious behaviour, safeguard sensitive data and assure maximum compliance with privacy and regulatory requirements. Also, the extensive use of cloud services necessitated by the COVID-19 crisis, both on-premise and public, will compel enterprises to reassess this ecosystem and take additional steps to protect it.

Getting Started With Cyber Ranges

Nearly every major company is redefining themselves as a software or technology company, and leaders are making cybersecurity one of their top priorities with a particular focus on workforce development. A growing number of bootcamps and programs are providing modern approaches to practical skills training, such as hands-on learning via simulated environments. This Refcard provides a brief overview and history of Cyber Ranges and quick examples of techniques to use on a live-action website.

8 Steps to Keep Remote Development Teams Secure

There is no doubt that the world's workforce is becoming more remote, particularly in tech as developers can now work from any location in the world. But there are a large number of new obstacles that come with this. The most pressing is security.

Take the current COVID-19 health crisis. From one day to the next, countries are going into quarantine and forcing companies and developers into working remotely. I for one am writing this from my home office in Paris, sipping filter coffee while looking onto the empty streets in a complete lock-down that started last week (April 2020).

Tips for Achieving Network Security in a Timely Manner

The number of cyber threats faced by businesses and individual internet users seems to increase by the minute. As such, individuals and enterprises that treat cybersecurity as an afterthought are often prime targets for hackers, data thieves, and malware spreaders.

When such unsavory characters are able to find their way onto private networks, the damage they do can be far-reaching.

Threat Hunting – A Cybersecurity Paradigm Shift

The internet has become a utility as essential as electricity and water for organizations worldwide. But it’s also an unparalleled security threat, an inviting doorway for global criminal networks.

Malicious hackers still seem to have the upper hand even with billions spent on cybersecurity and a high level of awareness of the growing danger. The 2019 Hiscox Cyber Readiness Report found that 61% of firms reported a “cyber incident,” which stands as an increase from 45% from the previous year. The median loss also increased from $229,000 to $369,000, not counting brand damage.1

Top 4 Cyber Security Trends to Watch Out For in 2020

Incidents of data breaches and theft are showing no signs of slowing down. According to Forbes, in the first half of 2019 alone, cybercriminals compromised the personal information of more than 4 billion users. As the world becomes more and more digitalized, businesses can longer afford to ignore cybersecurity.

One of the best ways to stay safe is to keep abreast of emerging cybersecurity trends, so here we’ll discuss five of the most prominent ones to be aware of going in 2020:

The Death of Passwords

The Problem With Passwords

If you’ve been paying attention to cybersecurity trends over the last few years, you’ll already know that security problems are frequently found “between chair and keyboard” (often shortened to PEBCAK in IT circles). The dangers of bad password hygiene are better known by “average” users than ever, with 81 percent of company data breaches caused by poor passwords.

At the same time, technology is reaching further into the corners of our lives, both at work and at home. Because password technology puts the onus on individuals to safely and securely manage their own access methods, users are increasingly put in positions where they’re responsible for security problems.

5 Ways to Improve Your IT Infrastructure

No matter how up-to-date your datacenter may seem, there’s always room for improvement. Growing means consistently examining your existing infrastructure for weak spots and asking if what you have in place is not only meeting the demands of your business today, but also setting you up for success in the increasingly multi-cloud focused future.

If you’re ready for an infrastructure revamp, here are a few recommendations to help you along your journey.

4 Reasons Not to Opt-In for Free Trials of New SaaS Products

No good company is happy to rest on its laurels when it comes to the tech they use. Especially with the prevailing Software-as-a-Service (SaaS) model, which allows today’s more innovative software companies to churn out better products all the time, it’s important that your team checks out new apps and tools that promise to improve efficiency and effectiveness. And many of these products offer tempting 14-day free trials, making it easier to try them on for size.

However, you can quickly go from test-drive to overdoing it when you continuously “trial” new services that promise to change the way you work. From compliance dangers to misalignment with the rest of your company’s tech stack, diving into too many trials can be detrimental to your company’s health.

4 Chatbots Security Measures You Absolutely Need to Consider

It will come as no surprise that chatbots are everywhere and they are here to stay! In fact, 80 percent of companies want to have some type of chatbot implemented by 2020.

Chatbots are our friendly assistants that make life easier by helping us book flights, appointments, shop, get answers to our questions, etc. They also allow companies to lower the cost in customer service and have their customer support agents attending to more complex situations.