Posts

Splunk: Cybersecurity Dynamics Rapidly Changing

Image
  A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned downtime attributable to a cybersecurity incident. The survey, conducted by Enterprise Strategy Group (ESG) on behalf of Splunk , also found that, on average, it takes 2.4 months to discover bad actors on corporate networks. Over a third (39%) of the respondents said cybersecurity incidents have directly harmed their competitive position, with 31% also noting those incidents have reduced shareholder value. As a result, cybersecurity budgets are increasing, with 95% of respondents reporting their security budgets will increase over the next two years, with 56% describing those increases as significant. The survey also found 81% of respondents are working for organizations that are converging aspects of their security and IT operations. Respondents believe this convergenc

CyberArk Blueprint for Identity Security Success

Image
THE CYBERARK BLUEPRINT  The CyberArk Blueprint for Identity Security Success is designed to help organizations establish and evolve an effective Identity Security program and accelerate their Identity Security success. The CyberArk Blueprint guides organizations through their Identity Security journey by assisting them in understanding the identity attack chain, assessing their security posture, learning best practices and building their roadmap. The CyberArk Blueprint’s prescriptive guidance is not built on theoretical advice; it is built on the combined knowledge and experience of CyberArk battling threats in the Identity Security space. These insights are gathered from more than two decades of lessons learned across CyberArk’s global customer base, post-breach experience, frontline remediators and red-team and innovative researchers. Each component provides best-practice guidance across the people, process and technology domains — all designed to help you accelerate your

Red Team — Automation or Simulation?

Image
 What is the difference between a penetration test and a red team exercise? The common understanding is that a red team exercise is a pen-test on steroids, but what does that mean? While both programs are performed by ethical hackers, whether they are in-house residents or contracted externally, the difference runs deeper. In a nutshell, a pen-test is performed to discover exploitable vulnerabilities and misconfigurations that would potentially serve unethical hackers. They primarily test the effectiveness of security controls and employee security awareness. The purpose of a red team exercise, in addition to discovering exploitable vulnerabilities, is to exercise the operational effectiveness of the security team, the blue team. A red team exercise challenges the blue team's capabilities and supporting technology to detect, respond, and recover from a breach. The objective is to improve their incident management and response procedures. The challenge with pen-testing and red team

Simplifying DDoS Protection in Large Service Provider Networks-Radware Solution

Image
Distributed denial of service (DDoS) attacks pose a significant threat to service providers; they have the potential to bring down critical infrastructure and disrupt business operations. In today’s digital age, protecting against DDoS attacks is no longer a luxury. It’s a necessity. However, implementing and managing effective DDoS protection solutions can be complex and costly, particularly for large service providers. In the following, we will explore how to simplify DDoS protection for the networks of large service providers. I’ll discuss the challenges facing them and provide practical solutions to mitigate the risks of DDoS attacks. The Challenges Of Protecting A Large Service Provider Network Scale: Service providers typically operate large networks with multiple entry points. This makes it a challenge to identify and mitigate DDoS attacks across the entire infrastructure. Complexity: DDoS attacks can come in various forms, and different types of attacks require different mitiga

New MITM Attack on Wi-Fi Networks Let Attackers Stealthily Hijack the Traffic

Image
  Recently, access to public   Wi-Fi networks   is easily feasible due to their availability in most common public places. The nature of Wi-Fi networks is such that supplicants, or end hosts, can come from all corners of the world and be owned by individuals from diverse organizations.  This contrasts wired LANs like Ethernet, where the end hosts typically belong to the same organization. With the rapid evolution of wireless networks, threat actors now have a greater opportunity to intercept other users’ traffic in the same network. That’s why the security mechanisms for wireless networks are constantly evolving, from the outdated  Wired Equivalent Privacy (WEP)  to the latest standard of Wi-Fi Protected Access 3 (WPA3). New MITM Attack The open-access nature of public Wi-Fi networks makes them particularly vulnerable to  MITM (Man-in-the-Middle)  attacks. In  Evil Twins attacks , also known as “Rogue Access Point attacks,” threat actors can deploy a fake wireless access point (AP) to

New APM Capabilities Help Optimize Application Performance Across Monoliths or Microservices

Image
Splunk Observability recently announced several new enhancements to reduce noise and provide more visibility when isolating problems in your environments. Specific to applications and services, whether you operate monolithic or microservices architectures these releases help you easily investigate problems in complex environments. Here’s a roundup of the recent Splunk APM capability releases. Easily Identify Problems From Billions of Traces Trace Analyzer helps to confidently detect patterns across billions of transactions and find specific issues for any tag, user, or service. Now you can identify unknown unknowns by running ad-hoc aggregations for all your trace data to find specific issues in any tag. Troubleshoot specific user issues by visualizing when patterns from errors and latency began and ended, and receiving the exact traces experienced during a problem. Understand the radius of an issue across customer groups by easily grouping and filtering high cardinality tags

The Imperva Content Delivery Network (CDN) to Improve website experience globally

Image
Today’s website visitors expect a fast and efficient user experience with no delays or site performance issues. However, high traffic volumes and global reaching websites mean website managers are faced with the challenge of added latency and slow page load times, which can result in lost business. According to WebSiteBuilderExpert.com, 1 in 4 site visitors would abandon a website that takes more than 4 seconds to load. And 46% of site visitors do not revisit poorly performing websites, according to Unbounce.com. A strong Content Delivery Network   (CDN) is critical for website managers and businesses that rely on their websites for success, and here are ten reasons why. Improve your engagement Faster site speed times and more responsive websites bring results in more conversions. As little as a  one-second delay  in page load time can reduce customer satisfaction by 16%. Slow page load times According to  Unbounce , ‘Nearly 70% of consumers admit that page speed influences their likel