Remove Authentication Remove Authorization Remove Information Remove Vulnerability
article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. Dr. Ahuja is a renowned name in the field of security and networking.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Harnessing Static and Dynamic Code Scanning in DevSecOps

Pure Storage

Harnessing Static and Dynamic Code Scanning in DevSecOps by Pure Storage Blog This blog on static and dynamic code scanning in DevSecOps was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. What Is Code Scanning?

article thumbnail

How to Counter AI-Driven Cybersecurity Threats to Physical Security Products

Security Industry Association

Cybersecurity professionals need to continually stay informed about the latest AI threat landscape and the AI tools available to counter it. Deepfakes can be used to impersonate authorized personnel and gain access to secure areas or to spread misinformation and create chaos.

article thumbnail

ISC East Session Preview: Securing IIoT Using Zero Trust — The Future of IIoT Cybersecurity

Security Industry Association

Will Knehr, senior manager of information security and data privacy, i-PRO Americas. These devices automate a lot of commercial processes which increase efficiency and often help to reduce costs, but they have also introduced a new set of vulnerabilities to organizations. Access to every resource must be authenticated and approved.

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

This “supply-chain cyberattack” gave hackers wide access to both government and corporate information systems. SSDF ensures that password complexity, authentication, encryption, software updates, and vulnerability management occur throughout a product’s life cycle. The response in the U.S.

article thumbnail

Data Protection Techniques

Solutions Review

Enterprise data protection techniques encompass a range of strategies and technologies aimed at safeguarding sensitive information. Access Controls and Authentication: Implementing stringent access controls and authentication mechanisms is crucial for data protection.