A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Quantum cryptography is seen as the way forward to protect all sorts of transactions. The standard has yet to be set and luckily one of the competing methods has just been broken.
Most cyber threats — like credential stuffing and card cracking — are committed by fraudsters with the aim of stealing money, data, or both. The law is clear on these cyberattacks: online fraud is illegal. But unlike these overtly malicious threats, web scraping isn’t always illegal, or even unethical. Aggregator sites like travel agencies and price comparison websites use scraper bots to help customers find the best deals.
Identity and Access Management or Identity Access Management (IAM) is a critical security function for organizations of all sizes for privileged access management. By managing access to systems and data, IAM can help mitigate the risk of information breaches and protect the organization's most valuable assets through IAM technologies.
Securely storing passwords is made easy by using a password manager. A password manager allows you to store all your passwords in one place, while only having to remember one password to secure all your accounts.
Alan Hannan is a member of the Netskope Network Visionaries advisory group. The cloud often seems like a black box for many corporate networking and security professionals. They have expertise in optimizing their internal network. Still, once they offload their traffic to the cloud, they figure they’re handing off optimization to the software-as-a-service (SaaS) provider.
As businesses and organizations scale and grow, their network infrastructure can also grow increasingly large and complex. Using a flat network structure (all devices connected on one server) makes it easier for cybercriminals to roam freely and unimpeded in the system in the event of a successful cyber attack. Implementing network segmentation best practices can limit the scope of an attack, prevent malware from spreading, and disrupt lateral movements across your IT ecosystem.