FreshRSS

πŸ”’
☐ β˜† βœ‡ The Hacker News

Cyber Security Is Not a Losing Game – If You Start Right Now

By The Hacker News β€” December 16th 2022 at 12:46
Reality has a way of asserting itself, irrespective of any personal or commercial choices we make, good or bad. For example, just recently, the city services of Antwerp in Belgium were the victim of a highly disruptive cyberattack.Β  As usual, everyone cried "foul play" and suggested that proper cybersecurity measures should have been in place. And again, as usual, it all happens a bit too late.
☐ β˜† βœ‡ The Hacker News

The Value of Old Systems

By The Hacker News β€” December 2nd 2022 at 13:00
Old technology solutions – every organization has a few of them tucked away somewhere.Β  It could be an old and unsupported storage system or a tape library holding the still-functional backups from over 10 years ago.Β  This is a common scenario with software too. For example, consider an accounting software suite that was extremely expensive when it was purchased. If the vendor eventually went
☐ β˜† βœ‡ The Hacker News

Been Doing It The Same Way For Years? Think Again.

By The Hacker News β€” November 21st 2022 at 13:00
As IT professionals, we all reach a certain point in our IT career where we realize that some of our everyday tasks are done the same way year after year without anyone questioning why it's done that way. Despite the constant change and improvement in technology, some things just get done the same ineffective way without any real thought behind it because "that's the way it's always been done."
☐ β˜† βœ‡ The Hacker News

Your OT Is No Longer Isolated: Act Fast to Protect It

By The Hacker News β€” November 4th 2022 at 13:12
Not too long ago, there was a clear separation between the operational technology (OT) that drives the physical functions of a company – on the factory floor, for example – and the information technology (IT) that manages a company's data to enable management and planning.Β  As IT assets became increasingly connected to the outside world via the internet, OT remained isolated from IT – and the
☐ β˜† βœ‡ The Hacker News

Back to Basics: Cybersecurity's Weakest Link

By The Hacker News β€” October 4th 2022 at 12:44
A big promise with a big appeal. You hear that a lot in the world of cybersecurity, where you're often promised a fast, simple fix that will take care of all your cybersecurity needs, solving your security challenges in one go.Β  It could be an AI-based tool, a new superior management tool, or something else – and it would probably be quite effective at what it promises to do. But is it a silver
☐ β˜† βœ‡ The Hacker News

Firing Your Entire Cybersecurity Team? Are You Sure?

By The Hacker News β€” September 23rd 2022 at 10:20
What on earth were they thinking? That's what we – and other security experts – were wondering when content giant Patreon recently dismissed its entire internal cybersecurity team in exchange for outsourced services. Of course, we don't know the true motivations for this move. But, as outsiders looking in, we can guess the cybersecurity implications of the decision would be inescapable for any
☐ β˜† βœ‡ The Hacker News

Integrating Live Patching in SecDevOps Workflows

By The Hacker News β€” September 6th 2022 at 08:57
SecDevOps is, just like DevOps, a transformational change that organizations undergo at some point during their lifetime. Just like many other big changes, SecDevOps is commonly adopted after a reality check of some kind: a big damaging cybersecurity incident, for example. A major security breach or, say, consistent problems in achieving development goals signals to organizations that the
☐ β˜† βœ‡ The Hacker News

Resolving Availability vs. Security, a Constant Conflict in IT

By The Hacker News β€” August 5th 2022 at 10:20
Conflicting business requirements is a common problem – and you find it in every corner of an organization, including in information technology. Resolving these conflicts is a must, but it isn’t always easy – though sometimes there is a novel solution that helps. In IT management there is a constant struggle between security and operations teams. Yes, both teams ultimately want to have secure
☐ β˜† βœ‡ The Hacker News

Why Developers Hate Changing Language Versions

By The Hacker News β€” July 8th 2022 at 11:08
Progress powers technology forward. But progress also has a cost: by adding new capabilities and features, the developer community is constantly adjusting the building blocks. That includes the fundamental languages used to code technology solutions. When the building blocks change, the code behind the technology solution must change too. It's a challenging and time-consuming exercise that
☐ β˜† βœ‡ The Hacker News

Do You Have Ransomware Insurance? Look at the Fine Print

By The Hacker News β€” June 20th 2022 at 13:34
Insurance exists to protect the insured party against catastrophe, but the insurer needs protection so that its policies are not abused – and that's where the fine print comes in. However, in the case of ransomware insurance, the fine print is becoming contentious and arguably undermining the usefulness of ransomware insurance. In this article, we'll outline why, particularly given the current
☐ β˜† βœ‡ The Hacker News

Even the Most Advanced Threats Rely on Unpatched Systems

By The Hacker News β€” June 9th 2022 at 11:54
Common cybercriminals are a menace, there's no doubt about it – from bedroom hackers through to ransomware groups, cybercriminals are causing a lot of damage. But both the tools used and the threat posed by common cybercriminals pale in comparison to the tools used by more professional groups such as the famous hacking groups and state-sponsored groups. In fact, these tools can prove almost
☐ β˜† βœ‡ The Hacker News

Yes, Containers Are Terrific, But Watch the Security Risks

By The Hacker News β€” May 23rd 2022 at 15:02
Containers revolutionized the development process, acting as a cornerstone for DevOps initiatives, but containers bring complex security risks that are not always obvious. Organizations that don’t mitigate these risks are vulnerable to attack.Β  In this article, we outline how containers contributed to agile development, which unique security risks containers bring into the picture – and what
❌