Sicurezza

Security Pros and Perils of Serverless Architecture

Pubblicato il

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software development. While serverless architecture offers some security advantages, trusting that a cloud provider has security fully covered can be risky. That’s why it’s […]

Sicurezza

Are Your DevOps Your Biggest Security Risks?

Pubblicato il

We have all heard the horror tales: a negligent (or uniformed) developer inadvertently exposes AWS API keys online, only for hackers to find those keys, penetrate the account and cause massive damage. But how common, in practice, are these breaches? Are they a legitimate threat, or just an urban legend for sleep-deprived IT staff? And […]

Sicurezza

Will We Ever See the End of Account Theft?

Pubblicato il

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the same passwords all over the internet; even after all the years of data breaches and account takeovers and thefts, user behavior stays the […]

Sicurezza

Adapting Application Security to the New World of Bots

Pubblicato il

In 2018, organizations reported a 10% increase in malware and bot attacks. Considering the pervasiveness (70%) of these types of attacks reported in 2017, this uptick is likely having a big impact on organizations globally. Compounding the issue is the fact that the majority of bots are actually leveraged for good intentions, not malicious ones. As a result, it is […]

ICT

Huawei apre un centro sulla sicurezza a Bruxelles

Pubblicato il

Inaugurato a Bruxelles, nel cuore dell’Europa, il nuovo Cyber Security Transparency Centre di Huawei: focus su 5G e standard di sicurezza. The post Huawei apre un centro sulla sicurezza a Bruxelles appeared first on Punto Informatico.

Sicurezza

IoT Expands the Botnet Universe

Pubblicato il

In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because IoT devices are always-on, rarely monitored and generally use off-the-shelf default passwords, they are low-hanging fruit for hackers looking for easy ways to build an army of malicious attackers. Every IoT device added to the network grows the hacker’s […]

ICT

Backstory: come Google Foto, ma per la sicurezza

Pubblicato il

Da esperimento del laboratorio X a prodotto commerciale di Alphabet: nasce Backstory, la soluzione della divisione Chronicle per la cybersecurity. The post Backstory: come Google Foto, ma per la sicurezza appeared first on Punto Informatico.

Sicurezza

Here’s How Carriers Can Differentiate Their 5G Offerings

Pubblicato il

Much of the buzz surrounding this year’s Mobile World Congress has focused on “cool” tech innovations. There are self-driving cars, IoT-enhanced bee hives, smart textiles that monitor your health, realistic human chatbots, AI robots, and so forth. But, one piece of news that has flown relatively under the radar is the pending collaboration between carriers […]

Sicurezza

Keeping Pace in the Race for Flexibility

Pubblicato il

Flexibility and elasticity. Both rank high on the corporate agenda in the age of digital transformation and IT is no exception. From the perspective of IT, virtualization and cloud computing have become the de facto standard for deployment models. They provide the infrastructure elasticity to make business more agile and higher performing and are the reason why the […]

Sicurezza

Mitigating Cloud Attacks With Configuration Hardening

Pubblicato il

For attackers, misconfigurations in the public cloud can be exploited for a number of reasons. Typical attack scenarios include several kill chain steps, such as reconnaissance, lateral movement, privilege escalation, data acquisition, persistence and data exfiltration. These steps might be fully or partially utilized by an attacker over dozens of days until the ultimate objective is achieved and the […]