This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on…
Browsing CategoryNetwork Security
6 Ways SASE Helps Protect Your Data
You start to log in to work from the home office you’ve occupied for the last two years only to sit and wait patiently as your virtual private network (VPN)…
Black Basta Besting Your Network?
This post was written with contributions from Chris Caridi and Kat Weinberger. IBM Security X-Force has been tracking the activity of Black Basta, a new ransomware group that first appeared…
Zero Trust and DNS Security: Better Together
How many times have you heard the popular information security joke: “It’s always DNS”? It means that every time there’s a problem you can’t figure out, you will dig until…
Update on Apache Log4j Zero-Day Vulnerability
IBM Security is following a recent disclosure regarding an Apache vulnerability in the Log4j Java library dubbed Log4Shell (or LogJam). X-Force Exchange has further details on the exploit. Millions of…
Understanding the Cyber Risk Exposures Within the Health Care Industry
The health care industry is one of the most popular and lucrative targets for cyberattacks and malicious activity. Health care organizations always present as an attractive proposition to hackers as…
An Attack Against Time
When Liza Minnelli sang that famous tune, “Money makes the world go around,” she should have added one more word: time. Time makes the world go around. It’s that one…
Why Privileged Access Management Is So Hard in the Cloud
Privileged access management (PAM) is in a bizarre place right now. On the one hand, organizations mostly understand the value of PAM. In a July 2019 study cited by Forbes,…
Threat Modeling: The Key to Dealing With 5G Security Challenges
With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network.…
The OSI Model and You Part 7: Stopping Threats at the Application Layer
A lot has changed since the creation of the Open Systems Interconnection (OSI) model. The OSI model dates back to the mid-1970s, designed to serve as a common basis for…