Cybersecurity Articles

What Are Application Containers And How Do I Secure Them?

You may have wondered what application containers are, let alone how to secure them. The National Institute of Standards and Technology (NIST) sets out to explain the benefits and security concerns with application container technologies in the latest Special Publication (SP 800-190) Application Container Security Guide.

What Are Application Containers And How Do I Secure Them? Read More »

6 Important Safeguards To Stop Insider Threats

Insider threats can be malicious or inadvertant, but the consequences can lead to costly brand damage or significant financial losses to your company. Understanding the types of insider threats and corresponding risk indicators can help minimize impact and damage caused by such threats.

6 Important Safeguards To Stop Insider Threats Read More »

Introduction to Information Security: 11 Key Takeaways

In case you missed it, the National Institute of Standards and Technologies (NIST) published a new guideline “An Introduction to Information Security” for individuals looking to get a better understanding of introductory information security best practices.

Introduction to Information Security: 11 Key Takeaways Read More »

5 Key Challenges Facing Cyber Threat Intelligence Sharing

As worldwide cyber threats keep growing, cyber criminals are constantly adapting their methods to attack organizations and evade detection. Standing on our own against such malicious attackers, most organizations don’t have a chance without effective threat communication between the public and private sectors.

5 Key Challenges Facing Cyber Threat Intelligence Sharing Read More »

IoT Cyber Attack Methods And Ways To Defend Them

In a recent cyber threat report, McAfee provided some good intelligence on how cybercriminals use Mirai attacks to infect poorly configured Internet of Things (IoT) devices and turn them into bots used for large scale network attacks.

IoT Cyber Attack Methods And Ways To Defend Them Read More »

Secure Authorization, Authentication and Access Control for IoT

To help organizations prepare for Internet of Things (IoT) threats, we outline some key security recommendations for IoT authorization, authentication and access control.

Secure Authorization, Authentication and Access Control for IoT Read More »

Improving Data Security with Secure Communications, Applications and APIs for IoT

Security firm Sucuri warned back in June how compromised CCTV devices were used in multiple denial-of-service (DDoS) attacks every day. In the report, nearly 25,000 compromised devices from all over the world were used in various attacks on small businesses.

Improving Data Security with Secure Communications, Applications and APIs for IoT Read More »

Hardware-based Security Controls for IoT

In this article, we highlight some key points from a recent Cloud Security Alliance (CSA) IoT report, to include hardware-based controls to enhance security of IoT products. The CSA IoT Working Group report, is titled “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products.”

Hardware-based Security Controls for IoT Read More »

How to Establish a Framework, Platform Security and Data Protections for IoT

In this article, we highlight some key points from a recent Cloud Security Alliance (CSA) IoT Working Group report, “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products,” to include guidance on how to establish a framework, platform and privacy protections to enhance security of IoT products.

How to Establish a Framework, Platform Security and Data Protections for IoT Read More »

Cyber Attacks Drive Need for IoT Security Standards

A working group from the Cloud Security Alliance (CSA) published a report to help guide Internet of Things (IoT) developers and designers with security controls in 13 key areas to improve security in IoT products. The security guidance covers secure development, platform security, data/privacy protection, key management and secure communications, just to name a few.

Cyber Attacks Drive Need for IoT Security Standards Read More »