Security News > 2021 > November

A new centralized log management module introduced by XDR provider Cynet could help organizations lighten that load and enhance organizations' visibility into their valuable log data. Cynet's new Centralized Log Management module offers organizations an effective way to deal with the massive volume of security logs most organizations - regardless of size - generate.

A new centralized log management module introduced by XDR provider Cynet could help organizations lighten that load and enhance organizations' visibility into their valuable log data. Cynet's new Centralized Log Management module offers organizations an effective way to deal with the massive volume of security logs most organizations - regardless of size - generate.

Clearly, security is paramount for any HDO looking to succeed in this environment. Because a strong, complex password typically contains more than 16 characters, clinicians are continuously forced to remember and enter this security information.

This article was written by Peter Gerdenitsch, Group CISO at Raiffeisen Bank International, and is based on a presentation given during Imvision's Executive Education Program, a series of events focused on how enterprises are taking charge of the API security lifecycle. We've got an API security course and cloud security course to deepen our security-related knowledge in these domains.

This article was written by Peter Gerdenitsch, Group CISO at Raiffeisen Bank International, and is based on a presentation given during Imvision's Executive Education Program, a series of events focused on how enterprises are taking charge of the API security lifecycle. We've got an API security course and cloud security course to deepen our security-related knowledge in these domains.

Sophos researchers have detailed how ransomware attackers are implementing a wide range of ruthless pressure tactics to persuade victims to pay the ransom. It highlights the shift in ransomware pressure techniques from solely encrypting data to including other pain points, such as harassing employees.

Conversely, the technology industry was plagued by threats at a rate much higher than other types of businesses, accounting for 50 percent of attacks. "As a result, encrypted channels create a significant blind spot in their security postures. The report on the state of encrypted attacks demonstrates that the most effective way to prevent encrypted attacks is with a scalable, cloud-based proxy architecture to inspect all encrypted traffic, which is essential to a holistic zero trust security strategy."

Using survey responses the cost of economic efficiencies from the use of passwordless technologies was calculated and suggests cost savings of $1.9M over conventional password-based MFA. "Enterprises continue to feel threatened in the pandemic with many feeling targeted, and this along with remote work and associated loss of productivity from password problems is driving increased adoption of passwordless technologies," said Dr Larry Ponemon. Organizations with passwordless authentication have significantly lower help desk calls pertaining to passwords.

According to an IDC report, through 2026, 65% of CIOs will sustain a cycle of tech-based empowerment, agility, and resilience through collaborative governance, new service delivery models, and a business outcomes orientation. Analysts Joe Pucciarelli, Serge Findling, and Pete Lindstrom focused on the "Future IT" and presented the key predictions that will impact CIOs and IT professionals worldwide over the next one-to-five years.

Cloud security is the umbrella that holds within it: IaaS, PaaS and SaaS. Gartner created the SaaS Security Posture Management category for solutions that continuously assess security risk and manage the SaaS applications' security posture. With enterprises having 1,000 or more employees relying on dozens to hundreds of apps, the need for deep visibility and remediation for SaaS security settings is only getting more critical.