Remove why-role-based-access-control-is-critical-to-your-security-stack
article thumbnail

Seven Microservices Identity Questions to Secure your Data

Thales Cloud Protection & Licensing

As I noted in my last blog post , containers, which are now pervasive in enterprises, are ephemeral, and microservices frameworks like Kubernetes treat them as such. Data security is a complex subject, and, unfortunately, microservices only add to the complexity. Data security. Network security. And now some questions.

article thumbnail

Is fighting cybercrime a losing battle for today’s CISO?

CyberSecurity Insiders

At times, the quest to stay on top of web application security can seem futile. In this blog, we’ll look at the root causes of concern for today's CISO and share some practical strategies to deter cybercriminals. The CISO role can be an unenviable one. Protecting your web apps in the real-world.

CISO 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leapfrogging with Smart Tech Refresh

Cisco Security

What is the first thing that comes to your mind when you hear the words “tech refresh?”. Or is it part of a much larger attempt to transform security to become an enabler for business transformation? Or is it part of a much larger attempt to transform security to become an enabler for business transformation?

article thumbnail

Node.js Vulnerability Cheatsheet

Security Boulevard

Securing applications is not the easiest thing to do. With all these components to secure, building a secure application can seem really daunting. With all these components to secure, building a secure application can seem really daunting. Security misconfiguration. Improper access control.

article thumbnail

Write Code That Protects Sensitive User Data

Veracode Security

list of the most critical application security risks. In this blog post, we will describe common scenarios of incorrect sensitive data handling and suggest ways to protect sensitive data. Social security numbers, passwords, biometric data, trade memberships and criminal records can also be thought of at sensitive data.

article thumbnail

Common vulnerabilities in Java and how to fix them

Security Boulevard

Securing applications is not the easiest thing to do. With all these components to secure, building a secure application can seem really daunting. With all these components to secure, building a secure application can seem really daunting. Let’s secure your Java application! Improper access control.

article thumbnail

Securing the Unsecured: State of Cybersecurity 2019 – Part I

McAfee

This blog was written by Wayne Anderson, previous Enterprise Security Architect at McAfee. Alongside some fantastic leaders and technology strategists from HCL, Oracle, Clarify360, Duo Security, and TCDI, we explored the challenges of today’s hyper-connected and stretched security team. Digital isn’t one trend—it’s many.