In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible.
Think of the last time you logged into your network. Let’s assume that you used a traditional VPN, with a traditional IAM scheme underneath. This isn’t a bad assumption, because 25% of all internet traffic goes over a VPN.
Open source databases may have a problem. For the second time in just three years, a popular open-source database has become infected, on a massive scale, with cryptocurrency-related malware. In late 2016, the vector of the infection was MongoDB, and the source of the infection was ransomware.
In a recent article from CSO Online, analyst Jon Oltsik wrote that many security professionals are unclear about the true meaning of software defined perimeter because of its confusing nomenclature.
A new report from IBM shows that the total number of breached records dropped about 25% last year, an amount representing 2.5 billion files. Unfortunately this did not mean that information security professionals suddenly discovered how to stop cyberattacks altogether. Most of the drop comes from files that have been encrypted, rather than outright stolen.
After several years in the making and a tidal wave of press coverage, the long-awaited EU General Data Protection Regulation (GDPR) finally came into force on May 25. And we’re all still here. But even if you still haven’t got your compliance house in order, it’s not too late.
Last week the biggest change to Europe’s privacy laws in almost a generation came into force. Depending on your organization it very well might require a major new approach to data protection — even if you’re located outside the EU.
At the time of this writing, the GDPR is about two weeks away. That’s a very short time when it comes to preparing for a new compliance regime, and we hope that most of you reading this have completed your preparations already. If not… well, there’s still time to prepare.