Alternative Search Engine

Security Think Tank: A three-pronged approach to application security

https://www.computerweekly.com/opinion/Security-Think-Tank-A-three-pronged-approach-to-application-security
See More From: computerweekly.com   ( Internet & Websites )

Nov 1, 2018 2:30 AM 5+ mon ago

Security Think Tank: A three-pronged approach to application security

In October 2018, an article in Computer Weekly noted that "Most organisations (67%) believe hackers can still penetrate their network and 89% say they have had an application layer attack in the past year". What can an organisation do to improve the security of their IT estate? I suggest a three-pronged approach:

Taking the first point, all software (operating system, applications, libraries etc.) should be a current supported version and maintained to the latest patch level.

Should any software be 12 months or less away from going out of supplier support, a project should be in place to update, replace or otherwise ensure continuing support.

Hardware likewise should be of a maintainable standard and it should go without saying that antivirus and anti-malware software and products including email, web and file transfer scanning applications should also be deployed either within the IT estate or ...

Read More

Security Think Tank: A risk-based approach to security outsourcing

computerweekly.com     8+ mon ago

...

Security Think Tank: Three ways to safeguard against application layer vulnerabilities

computerweekly.com     5+ mon ago

The only way organisations can protect themselves from importing vulnerabilities through third-party apps is to do due diligence on any apps being introduced to the company. All apps s...

Security Think Tank: Defend application layer with good security hygiene

computerweekly.com     5+ mon ago

As soon as you allow an application through your firewall, there is a possibility of a layer attack on it. Of course, we have to let applications through firewalls to do business - to allow remote use...

Security Think Tank: Approach UTM with caution

computerweekly.com     2+ mon ago

Security Think Tank: Approach UTM with caution How can organisations best use unified threat management tools to help stem the tide of data breaches? Share thi...

Security Think Tank: Adopt a proactive approach to software vulnerabilities

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Invest in proactive approach to security and digital risk

computerweekly.com     1+ mon ago

What should be the key cyber security risk indicator for any business? Share this item with your network: Ovum Instea...

Security Think Tank: Gap, risk and business impact analysis key to application security

computerweekly.com     5+ mon ago

While interface, usability and user experience are important factors, developers must follow a "White Book" on coding that considers security measures such as where logs are kept, how access control i...

Security Think Tank: Top considerations to reduce application layer attacks

computerweekly.com     5+ mon ago

I think it's important to always remember that nobody is going to secure your applications for you. There isn't going to be a magic patch you can apply every Tuesday that takes care of it for you. Lik...

Security Think Tank: Counter application layer attacks with automation

computerweekly.com     5+ mon ago

There have been improvements in coding practices and application testing, but at the same time, the Owasp top 10 application vulnerabilities still include SQL injection at number one and cross-site sc...

Security Think Tank: Three steps to detect malware comms

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. We are accustomed to clicking on something, triggering a response, and activating t...

Application attacks demand new security approach

computerweekly.com     8+ mon ago

Application attacks demand new security approach Applying security software updates is an ineffective way to deal with application layer cyber attacks and businesses should change their approach, secu...

Security Think Tank: Align security strategy to business objectives

computerweekly.com     4+ mon ago

Security Think Tank: Align security strategy to business objectives At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 ...

Security Think Tank: Situational awareness underpins effective security

computerweekly.com     4+ mon ago

Security Think Tank: Situational awareness underpins effective security As attackers begin to use multiple command and control systems to communicate with backdoors and oth...

Security Think Tank: Outsource security operations, not control

computerweekly.com     8+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Complex passwords provide a false sense of security

computerweekly.com     9+ mon ago

Security Think Tank: Complex passwords provide a false sense of security In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevi...

Security Think Tank: Top things to consider in security outsourcing

computerweekly.com     8+ mon ago

Security Think Tank: Top things to consider in security outsourcing What critical security controls can be outsourced, and how do organisations SMEs in particular maintain confidence that they...

Security Think Tank: Focus on security before app deployment

computerweekly.com     5+ mon ago

In the rush to deploy applications, security becomes an afterthought and is largely ignored when it really matters most - during the software development process. From a purely financial point of vie...

Security Think Tank: Put collaboration on 2019 security agenda

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. In the 12 years that Threat Horizon has been published, many of the predicted threa...

Security Think Tank: Many routes to UTM to boost security capabilities

computerweekly.com     2+ mon ago

Security Think Tank: Many routes to UTM to boost security capabilities How can organisations best use unified threat management tools to help stem the tide of data breaches...

Security Think Tank: UTM a key part of a well-rounded security strategy

computerweekly.com     2+ mon ago

Security Think Tank: UTM a key part of a well-rounded security strategy How can organisations best use unified threat management tools to help stem the tide of data breache...

Security Think Tank: C-suite needs to drive outcomes-based security

computerweekly.com     6+ mon ago

Everywhere you look, there are articles saying that security is a c-suite issue. Sadly, it seems the only people who do not realise that are members of the c-suite. The upper echelon of businesses nee...

Security Think Tank: Creative thinking key to meeting emerging security challenges

computerweekly.com     3+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Other developments, such as cloud computing, have hastened the displacement of netw...

Security Think Tank: Put more layers around passwords to up security

computerweekly.com     9+ mon ago

Security Think Tank: Put more layers around passwords to up security In light of the fact that complex passwords are not as strong as most people think and most password strategies inevitably lead to ...

Search Builder

(Click to add to search box)
Privacy Impact Assessment  transfer scanning applications  application layer attack  ethernet switch configurations  Cyber Essentials Plus  security monitoring products  security analytics  risk profile  log files  Cyber Essentials  practice levels  log analysers  partner organisations  phishing attack  ICO website  Computer Weekly  supplier support  patch level  backup regime  GDPR compliance  handling procedure  release levels  
**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.