How many times have you heard the popular information security joke: “It’s always DNS”? It means that every time there’s a problem you can’t figure out, you will dig until…
Browsing CategoryNetwork Security
Update on Apache Log4j Zero-Day Vulnerability
IBM Security is following a recent disclosure regarding an Apache vulnerability in the Log4j Java library dubbed Log4Shell (or LogJam). X-Force Exchange has further details on the exploit. Millions of…
Understanding the Cyber Risk Exposures Within the Health Care Industry
The health care industry is one of the most popular and lucrative targets for cyberattacks and malicious activity. Health care organizations always present as an attractive proposition to hackers as…
An Attack Against Time
When Liza Minnelli sang that famous tune, “Money makes the world go around,” she should have added one more word: time. Time makes the world go around. It’s that one…
Why Privileged Access Management Is So Hard in the Cloud
Privileged access management (PAM) is in a bizarre place right now. On the one hand, organizations mostly understand the value of PAM. In a July 2019 study cited by Forbes,…
Threat Modeling: The Key to Dealing With 5G Security Challenges
With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network.…
The OSI Model and You Part 7: Stopping Threats at the Application Layer
A lot has changed since the creation of the Open Systems Interconnection (OSI) model. The OSI model dates back to the mid-1970s, designed to serve as a common basis for…
The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer
In our journey through the Open Systems Interconnection (OSI) seven layers of networking, the OSI session layer is a gatekeeper that manages the connection between applications. In other words, we…
The OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer
As we’ve talked about in the rest of this series, there are several ways to use the Open Systems Interconnection (OSI) seven layers of networking model to help us secure our…
What is Network Detection and Response and Why is it So Important?
Networks are the foundation of today’s connected world. They allow millions of people, devices, apps and systems to talk with one another every minute of the day. Without networks, modern…