Sadly, many organizations find themselves in the majority of those surveyed in this article. Resources are simply not dedicated to monitoring systems and detecting anomalous behavior. If logs are being collected and correlated, the exceptions are not reviewed. Web application firewalls are either not in place or are not monitored appropriately. It is still a very slow process for the progression of proper security in most organizations.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page