Posts Tagged 'security management'

Server-side request forgery is an attack in which an attacker can force a vulnerable server to trigger malicious requests to third-party servers and or to internal resources. This vulnerability can then be leveraged to launch specific attacks such as a cross-site port attack, service enumeration, and various other attacks. This ability makes server-side request forgery […]

When your network spans the globe, you’ve got big challenges. How do you maintain visibility into potential network threats and stay in compliance with local regulations all at the same time? That was the problem facing one of our customers, a software developer for the international online gaming industry. This company has an enviable game […]

This blog was originally posted at Dark Reading on March 31. Shared cyberthreat intelligence will soon be a critical component of security operations, enabling organizations to better protect their digital assets and respond more quickly to emerging threats. On March 17, the US Department of Homeland Security announced the deployment of the Automated Indicator Sharing […]

These are the vital statistics for this week’s spotlight customer, a large building materials manufacturer: 25,000 desktops 40,000 users Thousands of miles separating security operations and the global data center This company faces security challenges at all levels of the business – from the systems on the manufacturing plant floor to business applications safeguarding sensitive […]

True Cost of Data Breaches from Matthew Rosenquist Data breaches are big business. Last year was a banner year for the loss of sensitive records. In 2015, more than 700 million records were exposed, with government and healthcare organizations representing the biggest victims. Wrapping our minds around the loss and subsequent costs is beyond difficult. […]