Remove Authentication Remove Authorization Remove Cybersecurity Remove Vulnerability
article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. What Is the Log4j Vulnerability?

article thumbnail

How to Counter AI-Driven Cybersecurity Threats to Physical Security Products

Security Industry Association

October is Cybersecurity Awareness Month , and the Security Industry Association (SIA) Cybersecurity Advisory Board is marking the occasion with a series of helpful content, tips and guidance on key cybersecurity topics. AI can be used to automate the discovery and exploitation of zero-day vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

Axis Communications’ Wayne Dorris Discusses How Mirai, SolarWinds Have Pushed the United States and European Union to Act Wayne Dorris is business development manager, cybersecurity, at Axis Communications. Many cybersecurity standards in the U.S. trillion by 2025. Department of Homeland Security (DHS). and parts of Europe.

article thumbnail

ISC East Session Preview: Securing IIoT Using Zero Trust — The Future of IIoT Cybersecurity

Security Industry Association

Among the robust lineup of conference sessions is the presentation Securing IIoT Using Zero Trust – The Future of IIoT Cybersecurity. These devices automate a lot of commercial processes which increase efficiency and often help to reduce costs, but they have also introduced a new set of vulnerabilities to organizations.

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. Dr. Ahuja is a renowned name in the field of security and networking.

article thumbnail

DHS Announces New Grants to Bolster Cybersecurity Under Infrastructure Law

Security Industry Association

Last week the Department of Homeland Security (DHS) announced a joint effort between the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA) to provide new cybersecurity grants authorized and funded under the Bipartisan Infrastructure Law.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

It has been republished with permission from the author. Cybersecurity sentiment has shifted dramatically – in fact, Gartner recently noted that 88 percent of board of directors now acknowledge that cybersecurity is a key business risk rather than simply just an IT problem, a 58 percent jump from five years ago.

Backup 96