Remove Authentication Remove Authorization Remove Education Remove Vulnerability
article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. Dr. Ahuja is a renowned name in the field of security and networking.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISC East Session Preview: Securing IIoT Using Zero Trust — The Future of IIoT Cybersecurity

Security Industry Association

15-17 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program , including keynote presentations from top luminaries and over 30 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

It has been republished with permission from the author. Armed with that background, it’s possible to prepare your internal or external cyber threat management team, educate your employees about what to look out for, and how to navigate it. But how do you achieve it?

Backup 96
article thumbnail

How an MSP protects a business’s VoIP systems

Online Computers

Unfortunately, VoIP systems are vulnerable to a number of cybersecurity threats, such as malware and distributed denial-of-service attacks. This reduces the risk of malicious actors exploiting system vulnerabilities or weaknesses. An MSP can enable MFA for added protection.

article thumbnail

How to Counter AI-Driven Cybersecurity Threats to Physical Security Products

Security Industry Association

Deepfakes can be used to impersonate authorized personnel and gain access to secure areas or to spread misinformation and create chaos. Zero-day attacks : Zero-day attacks are attacks that exploit vulnerabilities in software that the vendor is not aware of.

article thumbnail

Data Protection Techniques

Solutions Review

Access Controls and Authentication: Implementing stringent access controls and authentication mechanisms is crucial for data protection. Educating employees about data protection best practices and raising awareness about potential security threats is crucial.