Data stolen? Get used to it kid. That’s the reality for young people coming of age today in the app sec shanty town that is the 21st century U.S. economy. Like the actual favelas and shanty towns that have sprung up in developing nations over the last century, our application ecosystem is sprawling, unregulated, ad-hoc and prone to shocking breakdowns and failures. Our kids are paying the price.
In this Expert Insight, Derek Kernus, the Director of Cybersecurity Operations at DTS talks about the challenges facing small businesses that are under pressure to adopt cybersecurity best practices without breaking their budget. Derek offers suggestions for prioritizing cybersecurity investments – and things to watch out for as you build out an advanced cybersecurity program.
New threats demand that we transform the way we think about securing the endpoints. Case in point: APIs, writes Ross Moore.
A school that never sleeps? Cameras that go dark? A dead company hacked back to life? Welcome to the growing Internet of Zombie devices that threatens the security of the Internet.
Security analysts and threat hunters know the importance of IOCs – indicators of compromise. But EOCs – enablers of compromise – are just as important.