Home Blog Page 124

Securing Modern Web Applications: Threats and Types of Attacks

Web Application Firewalls are the most advanced firewall capabilities available to IT teams. Deploying the appropriate WAF is important, especially these days when the security threat landscape is changing so rapidly. In a previous post, we introduced Web Application Firewalls: Securing Modern Web Applications, a comprehensive eBook that addresses the latest application threats, the types of attacks, the evolution of...

Trends to look for next week at RSA Conference 2018

Next week (April 16-19) is the 2018 RSA Conference at the Moscone Center in San Francisco, and there’s good news: it’s not too late to register for a complimentary Exhibit Hall Only Pass using the Centrify entry code X8ECENTR. You’ll get free admission to the Exhibit Hall, Wednesday through Friday keynotes, select sessions throughout the week, and several other...

APT Trends report Q1 2018

In the second quarter of 2017, Kaspersky’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports in an effort to make the public aware of the research we have been conducting. This report serves as the next installment, focusing on the relevant activities that we observed during Q1 2018. These summaries serve as...

Centrify Zero Trust Security Partners in the Spotlight at RSA Booth 501

RSA Conference has moved back to April this year, and next week the largest cybersecurity trade show in the world will once again convene at Moscone Center in San Francisco. Centrify will be front and center this year – literally. Our booth #501 is right in the middle of the entrance to the South Hall. You can’t (and won’t want...

Driving DevOps Security: Scalable Best Practices

Driving DevOps Security: Scalable Best Practices #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{ width:100%; } .ExternalClass{ width:100%; } body{ -webkit-text-size-adjust:none; } body{ margin:0; padding:0; } img{ border:0; height:auto; line-height:100%; outline:none; text-decoration:none; } table td{ border-collapse:collapse; } #backgroundTable{ height:100% !important; margin:0; padding:0; width:100% !important; } body,#backgroundTable{...

How to Tune Your Database Security to Protect Big Data

As digital information and data continues to accumulate worldwide, new big data solutions grow more and more popular. The introduction of IoT into our lifestyle, which turns appliances into smart data logging machines, along with organizations tracking behaviors for data science and research purposes, has made the move into big data storage inevitable. Non-relational databases provide us with volume, velocity,...

Netskope

<img src="/sites/default/files/NET_horizontal_fullcolor.png"> DG and Netskope for enterprise DLP + cloud access security - Read more

Smart Cloud Security

Learn More DG and Netskope for enterprise DLP + cloud access security 1 - Read more

Stop Breaches with Analytics and Artificial Intelligence

According to Gartner, companies will spend up to $96 billion worldwide on security this year, but research by Centrify and Dow Jones suggests that up to 79% of companies have experienced a significant breach. Forrester estimates that 80% of security breaches involve privileged credentials. It’s understandable: After an intruder gains access to the employees’ devices, they try to snoop the...

A Deep Dive into Database Attacks [Part IV]: Delivery and Execution of Malicious Executables through SQL Commands (MySQL)

In a previous post we covered different techniques for execution of SQL and OS commands through Microsoft SQL server that can be used for delivering and executing malicious payloads on the target system. In this post we’ll discuss the same topic for MySQL database. Creating an executable directly on MySQL server via SQL commands In the one of the previous posts...

Latest article

2025 FINMA ISAE 3000 Type II attestation report available with 183 services in scope

Amazon Web Services (AWS) is pleased to announce the issuance of the Swiss Financial Market Supervisory Authority (FINMA) Type II attestation report...

Vulnerability monitoring service secures public-sector websites faster

An automated scanning system has cut the time it takes to fix cybersecurity vulnerabilities across public sector IT systems, reducing...

Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely

A high-severity security vulnerability has been discovered in Google Chrome’s integrated Gemini AI assistant, exposing users to unauthorized camera and microphone access, local file...

2nd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resorts, a...