Whitepaper: Don’t think serverless security, think application security

| April 21, 2019

article image
As the next logical step in cloud computing, serverless is fundamentally changing the way developers need to think about applications and write code. While new technologies will always raise security questions, claims that serverless poses new risks are incorrect; there are no new cybersecurity threats that are serverless-specific. In fact, serverless can actually improve an application’s security posture. This includes advantages such as that the serverless provider handles security for major parts of the stack and a small, contained blast radius.

Spotlight

CSS Corp

CSS Corp is the global leader in technology support. Over 100+ clients, including Fortune 1000 enterprises, count on our expertise in supporting enterprise and consumer products, managing IT infrastructures (stand-alone, cloud or mobile-enabled), and deploying networks. According to a leading analyst agency, CSS Corp has been listed as a challenger for product and technical support services in its latest report. Technology support is in our DNA. With over 5,500 technology professionals across 15 locations globally, we have a rich heritage of managing large and complex support ecosystems. From home devices, be it enterprise or consumer, data centers, applications and desktops, we have built our reputation on delivering stellar customer experiences. Because we are wired to support.

OTHER ARTICLES

Protecting against Cybersecurity Threats when Working from Home

Article | March 11, 2020

With the spread of the novel coronavirus (COVID-19), many organizations are requiring or permitting employees to work remotely. This post is intended to remind employers and employees that in the haste to implement widespread work-from-home strategies, data security concerns cannot be forgotten.Employers and employees alike should remain vigilant of increased cybersecurity threats, some of which specifically target remote access strategies. Unfortunately, as noted in a prior blog post, cybercriminals will not be curtailing their efforts to access valuable data during the outbreak, and in fact, will likely take advantage of some of the confusion and communication issues that might arise under the circumstances to perpetrate their schemes. Employees working from home may be accessing or transmitting company trade secrets as well as personal information of individuals. Inappropriate exposure of either type of data can lead to significant adverse consequences for a company.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | March 11, 2020

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

Creating and rolling out an effective cyber security strategy

Article | March 11, 2020

What’s more, organisations should also keep in mind that prevention alone is not enough; according to IBM, the average breach detection and containment times currently sits in the region of 280 days. In this time, it’s easy for cyber attackers to gain a foothold in an environment and quickly cause damage. “When developing a cyber security strategy, traditionally enterprises have focused on the threat prevention with little attention given to detection and often none to response,” said Martin Riley, director of managed security services at Bridewell Consulting.

Read More

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | March 11, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

Spotlight

CSS Corp

CSS Corp is the global leader in technology support. Over 100+ clients, including Fortune 1000 enterprises, count on our expertise in supporting enterprise and consumer products, managing IT infrastructures (stand-alone, cloud or mobile-enabled), and deploying networks. According to a leading analyst agency, CSS Corp has been listed as a challenger for product and technical support services in its latest report. Technology support is in our DNA. With over 5,500 technology professionals across 15 locations globally, we have a rich heritage of managing large and complex support ecosystems. From home devices, be it enterprise or consumer, data centers, applications and desktops, we have built our reputation on delivering stellar customer experiences. Because we are wired to support.

Events