A new piece of research from academics at ETH Zurich has identified a number of critical security issues in the MEGA cloud storage service that could be leveraged to break the confidentiality and integrity of user data. In a paper titled "MEGA: Malleable Encryption Goes Awry," the researchers point out how MEGA's system does not protect its users against a malicious server, … [Read more...] about Researchers Uncover Ways to Break the Encryption of ‘MEGA’ Cloud Storage Service
ways
Security resilience: 4 ways to achieve company-wide buy-in
There are some very tough questions I’ve come across in my time. How does one walk into Mordor, if not simply? Why isn’t there a special name for the tops of your feet? (Credit to Lily Tomlin for that one.) For a security leader, the toughest questions are often around security buy-in: How do you achieve active support across the organization for building resilience? Is there a … [Read more...] about Security resilience: 4 ways to achieve company-wide buy-in
Too many fields! 3 ways to prevent mapping explosion in Elasticsearch
Too many fields! 3 ways to prevent mapping explosion in ElasticsearchEnglish简体中文한국어日本語FrançaisDeutschEspañolPortuguêsA system is said to be "observable" when it has three things: logs, metrics, and traces. While metrics and traces have predictable structures, logs (especially application logs) are usually unstructured data that need to be collected and parsed to be really … [Read more...] about Too many fields! 3 ways to prevent mapping explosion in Elasticsearch
Six ways to streamline development with Elastic Cloud
Elastic helps developers enhance customer search experiences, keep mission-critical applications running smoothly, and protect against cyber threats. As many developers shift to the cloud for the speed, flexibility, and cost-efficiency, they can deploy Elastic in their preferred public cloud, or in multiple clouds, and extend the value of Elastic with cloud-native features. … [Read more...] about Six ways to streamline development with Elastic Cloud
5 ways search can modernize digital experiences in public sector
Customer experience (CX) is a growing field in the public sector. Offices like Technology Transformation Services are charged with designing and delivering a digital government with and for the public. As such, customer experience strategists, user experience designers, technical innovation analysts, and others are integral to modernizing digital experiences and in many cases … [Read more...] about 5 ways search can modernize digital experiences in public sector
Four Ways to Assess Your Zero Trust Security Posture
With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any device. While this newfound flexibility has changed the way we think about productivity, it has also created new cybersecurity challenges for organizations. Historically, enterprise data was stored inside data centers and guarded by … [Read more...] about Four Ways to Assess Your Zero Trust Security Posture
3 Ways to Secure SAP SuccessFactors and Stay Compliant
The work-from-anywhere economy has opened up the possibility for your human resources team to source the best talent from anywhere. To scale their operations, organizations are leveraging the cloud to accelerate essential HR functions such as recruiting, onboarding, evaluating, and more. SAP is leading this HR transformation with its human capital management (HCM) solution, SAP … [Read more...] about 3 Ways to Secure SAP SuccessFactors and Stay Compliant
Three ways ISE 3.0 enables visibility-driven network segmentation to gain zero trust
ISE 3.0 – Control access and contain threats within zones of trust You wake up to find out that another security incident has occurred. You are confused and not sure how the attacker was able to get by your perimeter. But then you realize you haven’t had a perimeter for some time as it has been pulled apart by cloud, mobility, and IoT. Like your network resources, your … [Read more...] about Three ways ISE 3.0 enables visibility-driven network segmentation to gain zero trust
Straight from the source: 3 ways customers are improving security with Secure Network Analytics
We know all too well that security can be a grind and that modern threats are and will continue to become more and more stealthy and sophisticated. A few years ago, the typical security practitioner’s plight was often described as an anxiety-inducing and exhausting existence that involved sifting through an endless barrage of alerts and reacting whenever known threats had … [Read more...] about Straight from the source: 3 ways customers are improving security with Secure Network Analytics
Microsoft Reveals New Innocent Ways Windows Users Can Get Hacked
Microsoft earlier today released its August 2020 batch of software security updates for all supported versions of its Windows operating systems and other products.This month's Patch Tuesday updates address a total of 120 newly discovered software vulnerabilities, of which 17 are critical, and the rest are important in severity.In a nutshell, your Windows computer can be hacked … [Read more...] about Microsoft Reveals New Innocent Ways Windows Users Can Get Hacked