Security
Software y sistemas de seguridad de datos y privacidad
Understanding the IoT Attack Surface
- Read more about Understanding the IoT Attack Surface
- Log in to post comments
An attack surface is the amalgamation of all the possible points of entry that an attacker could use to exploit or compromise a system, network, or application. In other words, it represents the different ways in which an attacker could gain unauthorized access or control over a target..
Is Application Security the Next Frontier of Data Security?
Application security (AppSec) is an integral part of the development lifecycle, ensuring applications are built with security against various threats, including insider threats and malicious intrusion. Internal threats can occur due to human error and malicious acts like phishing schemes, and external threats can involve malware and injection attacks.
Why EDR Can Prevent the Next Data Breach
- Read more about Why EDR Can Prevent the Next Data Breach
- Log in to post comments
Endpoints are devices connected to your network, such as smartphones, laptops, routers, and Internet of Things (IoT) sensors. Endpoints enable users to access the network from different physical locations and devices. However, this benefit can turn into a risk when attackers take advantage of endpoints to breach the network. Read on to learn how to secure endpoints with EDR practices and tools..
Endpoint Threats: Vulnerabilities to Eliminate
- Read more about Endpoint Threats: Vulnerabilities to Eliminate
- Log in to post comments
Digital information is arguably the most important asset for modern businesses, from financial data to customer demographics. The potential loss of customer or business data carries too heavy a risk to ignore, from regulatory fines to loss of brand trust and customers.
Despite the risks, businesses are using an increasing number of network-connected devices, many of which are not centrally managed or protected. Such devices grant attackers more potential routes into a system and create more points for businesses to protect..
How to Protect Your Data in 2019
- Read more about How to Protect Your Data in 2019
- Log in to post comments
The number and variety of threats to your business and personal data are always increasing. In 2019, attackers have become so sophisticated that it can be a struggle to stay ahead of them. As many as a third of organizations cannot protect their data from cybersecurity threats.
Read on to learn about some of the common data security threats, as well as a number of tools and practices that can help you protect your data in the event of a breach..
What is Storage Tiering and How Can it Reduce Storage Costs?
Tiered storage is a way of managing data by assigning it to different types of storage devices/media depending on the current value that the underlying information provides. The efficient management of data recognizes that all information provides an intrinsic value from the time it’s created to the time it becomes obsolete and that this value changes over the information lifecycle.
The typical factor determining the value of information is how frequently you access it, however, policy-based rules can factor a number of other issues to determine information value. For example, old bank transactions, which might have a low value, could suddenly shift in value depending on special circumstances, such as a tax audit. This article discusses some pros, cons, and best practices for tiered storage..