Security News

How Searchable Encryption Changes the Data Security Game
2024-07-29 10:40

Just looking at traditional encryption of data at rest, these encryption solutions commonly involve a complete "Lift and shift" of the database to the encryption at rest solution. A modern, more complete database encryption strategy must account for encryption of critical database data in three states: at rest, in motion, and now IN USE. Searchable Encryption, also called Encryption-in-Use, keeps that data fully encrypted while it's still usable.

Post-CrowdStrike, Microsoft to discourage use of kernel drivers by security tools
2024-07-29 06:30

Redmond shared a technical incident response write-up on Saturday - titled "Windows Security best practices for integrating and managing security tools" - in which veep for enterprise and OS security David Weston explained how Microsoft measured the impact of the disaster: By accessing crash reports shared by customers. Weston's post justifies how Windows performed, on the grounds that kernel-level drivers - like those employed by CrowdStrike - can improve performance and prevent tampering with security software.

Post-CrowdStrike, Microsoft to discourage use of kernel drivers by security tools
2024-07-29 06:30

Microsoft has admitted that its estimate of 8.5 million machines crashed by CrowdStrike's faulty software update was almost certainly too low, and vowed to reduce infosec vendors' reliance on the kernel drivers at the heart of the issue. Redmond posted an incident response blog on Saturday - titled "Windows Security best practices for integrating and managing security tools" - in which veep for enterprise and OS security David Weston explained how Microsoft measured the impact of the incident: by accessing crash reports shared by customers.

How to Build an Effective Security Operations Center
2024-07-28 16:00

Taking a coordinated security approach is one way to leave no security loopholes. By this, we are referring to a cybersecurity architecture that comprises a team and security components working...

Master Cybersecurity With The Complete CompTIA Security+ SY0-701 Certification Kit by IDUNOVA
2024-07-26 08:42

TL;DR: The Complete CompTIA Security+ SY0-701 Certification Kit by IDUNOVA is a great resource to prepare for your exams. The Complete CompTIA Security+ SY0-701 Certification Kit by IDUNOVA is designed to provide you with all the resources and guidance needed to succeed.

6 Types of Applications Security Testing You Must Know About
2024-07-25 11:20

While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for all three types. There are six core types of testing that every security professional should know about to secure their applications, regardless of what phase they are in in development or deployment.

Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security
2024-07-25 09:58

Ironically the browser is also one of the least protected threat surfaces of the modern enterprise. Modern cybersecurity requires a new approach based on the protection of the browser itself, which offers both security and frictionless deployment.

Cloud security threats CISOs need to know about
2024-07-25 04:00

In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data...

The most urgent security risks for GenAI users are all data-related
2024-07-25 03:00

Regulated data makes up more than a third of the sensitive data being shared with GenAI applications-presenting a potential risk to businesses of costly data breaches, according to Netskope. There are positive signs of proactive risk management in the nuance of security and data loss controls organizations are applying: for example, 65% of enterprises now implement real-time user coaching to help guide user interactions with GenAI apps.

How a Trust Center Solves Your Security Questionnaire Problem
2024-07-24 12:01

Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules of professionals with...