The software essentially exempted Apple's own programs from being routed through its Network Extension Framework, which the company created for third-party security products to monitor and filter network traffic.
Last fall we discussed what security data do I really need to collect and analyze. We know we don’t need it all, but this was only the sensor part of the discussion. Now that we have that data identified and those sensors in place, what brain do I need to collect and analyze it? There […]
The news is flooded with updates regarding the COVID-19 vaccine. Cyberattacks are targeting the vaccine supply chain. Phishing attacks are exploiting sign-ups for the vaccine. There are even attacks to get access to vaccine data. Sounds a lot like our enterprises every day! We’re all learning about human immunology from the headlines, but what are […]
Cloud-Native and Serverless are the next evolution of application architecture. But protecting these applications is not easy. Where do I install my agent? How do I monitor network traffic? What APIs are exposed? The adoption of containers started this challenge a few years ago by abstracting the application from the operating system. In order to […]
We’ve been told for years that we don’t have enough data for security. Then we see the headlines and quotes… “Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.” “All decisions about cybersecurity strategies, program priorities, investments, etc. should be made based upon analysis of real-time and historical data.” New […]
We’re all familiar with the Open Web Application Security Project (OWASP) Top 10 Web Application Security Risks. Not only have organizations used this list to adopt new development practices to produce more secure code, but security vendors have built products to detect and prevent these top attacks. But what happens when an attacker uses your […]