Jan 02, 2024The Hacker NewsBrowser Security / Threat Protection Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a re-evaluation of how it is managed and protected. While not long-ago web-borne risks were still addressed by a patchwork of endpoint, network, and cloud solutions, it is now clear that … [Read more...] about The Definitive Enterprise Browser Buyer’s Guide
Enterprise
LayerX’s Enterprise Browser Security Extension
The browser has become the main work interface in modern enterprises. It's where employees create and interact with data, and how they access organizational and external SaaS and web apps. As a result, the browser is extensively targeted by adversaries. They seek to steal the data it stores and use it for malicious access to organizational SaaS apps or the hosting machine. … [Read more...] about LayerX’s Enterprise Browser Security Extension
Top 6 security considerations for enterprise AI implementation
,As the world experiences the AI gold rush, organizations are increasingly turning to enterprise AI solutions to gain a competitive edge and unlock new opportunities. However, amid the excitement and potential benefits, one crucial aspect that must not be overlooked is data security — in particular, protecting against adversarial attacks and securing AI models. As businesses … [Read more...] about Top 6 security considerations for enterprise AI implementation
How to add support for more languages in your Elastic Enterprise Search engines
How to add support for more languages in your Elastic Enterprise Search enginesEngines in Elastic App Search enable you to index documents and provide out-of-the-box, tunable search capabilities. By default, engines support a predefined list of languages. If your language is not on that list, this blog explains how you can add support for additional languages. We’ll do this by … [Read more...] about How to add support for more languages in your Elastic Enterprise Search engines
New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise Devices
Mar 03, 2023Ravie LakshmananEnterprise Security / IoT A pair of serious security defects has been disclosed in the Trusted Platform Module (TPM) 2.0 reference library specification that could potentially lead to information disclosure or privilege escalation. One of the vulnerabilities, CVE-2023-1017, concerns an out-of-bounds write, while the other, CVE-2023-1018, is … [Read more...] about New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise Devices
Fortinet and Zoho Urge Customers to Patch Enterprise Software Vulnerabilities
Jan 05, 2023Ravie LakshmananApplication Security / SQLi Fortinet has warned of a high-severity flaw affecting multiple versions of FortiADC application delivery controller that could lead to the execution of arbitrary code. "An improper neutralization of special elements used in an OS command vulnerability in FortiADC may allow an authenticated attacker with access to the web … [Read more...] about Fortinet and Zoho Urge Customers to Patch Enterprise Software Vulnerabilities
Making the most of your unstructured log data through enterprise log management
As we mentioned before, this is the single most important step for indexing custom logs. Technically these fixes are optional, but doing so allows you to get the most value from your unstructured logs. The log messages themselves are still unstructured and could contain anything — logs of text, numbers, expectations, errors, you name it.If you expand and review one of your log … [Read more...] about Making the most of your unstructured log data through enterprise log management
ALL IN at Cisco Live 2022 Melbourne: Building Security Resilience for the Modern Enterprise
After a two-year hiatus, Cisco Live 2022 Melbourne is back! Personally, it will be a special experience, attending with my team and leaders for the first time as the Asia Pacific Cybersecurity Lead. I will be speaking on the “Top Priorities for IT and Security Leaders in 2023” on 7 December at the Cisco Secure Insights Live, covering key priorities for security leaders as we … [Read more...] about ALL IN at Cisco Live 2022 Melbourne: Building Security Resilience for the Modern Enterprise
High-Severity Flaws in Juniper Junos OS Affect Enterprise Networking Devices
Multiple high-severity security flaws have been disclosed as affecting Juniper Networks devices, some of which could be exploited to achieve code execution. Chief among them is a remote pre-authenticated PHP archive file deserialization vulnerability (CVE-2022-22241, CVSS score: 8.1) in the J-Web component of Junos OS, according to Octagon Networks researcher Paulos … [Read more...] about High-Severity Flaws in Juniper Junos OS Affect Enterprise Networking Devices
CrowdStrike a Google Chrome Enterprise Recommended Partner
Organizations today face an onslaught of attacks across devices, identity and cloud workloads. The more security telemetry an organization has to work with, the better threat hunters can contextualize events to find and remediate potential threats. Google recently announced Chrome Enterprise Connectors Framework, a collection of plug-and-play integrations with industry-leading … [Read more...] about CrowdStrike a Google Chrome Enterprise Recommended Partner