Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Data Loss Prevention: Artificial Intelligence vs. Human Insight
Expert On How The UK Police Data Loss...
Cyber Criminals Left Stolen Phishing Credentials Exposed To...
Cyber Expert On Malware Found On Laptops Provided...
OpenText Research Offers A Snapshot Of UK Attitudes...
How Much Are You Worth On The Dark...
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Expert(s): November 30, 2020
Paul Farrington
EMEA CTOfeature_status*/ ?>
Veracode

Comments Dotted : 3
December 21, 2020

Cyber Security Predictions 2021: Experts’ Responses

They will need to focus less on the security of the operating system and runtime environment and more on the application layer.

If 2020 has taught us anything, it is that a business is only as agile as its infrastructure, proving how much we depend on cloud-native technologies. With infrastructure becoming increasingly immutable, I predict we’ll see the impact of this specifically as it relates to the rise of cloud-native technologies and infrastructure as code. Both of these trends offer major business benefits in terms of automation, cost, scale, and security.

 

As companies continue to outsource their infrastructure

.....Read More

If 2020 has taught us anything, it is that a business is only as agile as its infrastructure, proving how much we depend on cloud-native technologies. With infrastructure becoming increasingly immutable, I predict we’ll see the impact of this specifically as it relates to the rise of cloud-native technologies and infrastructure as code. Both of these trends offer major business benefits in terms of automation, cost, scale, and security.

 

As companies continue to outsource their infrastructure to third parties and pivot their focus to consuming services, they will need to focus less on the security of the operating system and runtime environment and more on the application layer. Furthermore, as infrastructure turns into code, the better "choke point" to scan for infrastructure vulnerabilities becomes the code rather than servers in production.

  Read Less
Like(1)  (0)

Linkedin Message

@Paul Farrington, EMEA CTO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"They will need to focus less on the security of the operating system and runtime environment and more on the application layer...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-security-predictions-2021-experts-responses

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Paul Farrington, EMEA CTO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"They will need to focus less on the security of the operating system and runtime environment and more on the application layer...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-security-predictions-2021-experts-responses

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 23, 2020

Expert Comment On UK Government’s Cyber Investment

It is therefore essential that application security is closely considered as part of this investment.
The notable increase in UK military investment, particularly in cyber defense and automation, is a positive milestone in the government’s growing commitment to addressing new and emerging threats. Given the current technology skills shortage, especially in security – only five undergraduate computer science degrees are certified by the UK’s NCSC for cybersecurity content – it’s clear more needs to be done to prepare for and mitigate the impact of cybersecurity attacks. Both users and.....Read More
The notable increase in UK military investment, particularly in cyber defense and automation, is a positive milestone in the government’s growing commitment to addressing new and emerging threats. Given the current technology skills shortage, especially in security – only five undergraduate computer science degrees are certified by the UK’s NCSC for cybersecurity content – it’s clear more needs to be done to prepare for and mitigate the impact of cybersecurity attacks. Both users and the creators of software will benefit from the investment, which could stimulate the economy through the creation of 40,000 new jobs. There’s no shortage of security flaws to be fixed in the applications we use every day. We know from our Veracode State of Software Security research, for example, that 76% of apps have at least one security flaw. It is therefore essential that application security is closely considered as part of this investment, ensuring people are equipped with the skills, tools, and technology to create software that is robust from the outset. To transform itself, the British military could follow the same way as its European peers as military organisations such as the German Army (Bundeswehr) are relying on open-source software. Using open-source and proprietary software carries both risks and benefits. Application security pioneer Veracode’s recent SoSS report has shown, there is an alarming number of security flaws in the applications that we use every day, proving that a large focus on cybersecurity, and also on improving the technology skills shortage, is imperative.  Read Less
Like(0)  (0)

Linkedin Message

@Paul Farrington, EMEA CTO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"It is therefore essential that application security is closely considered as part of this investment...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-comment-on-governments-cyber-investment

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Paul Farrington, EMEA CTO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"It is therefore essential that application security is closely considered as part of this investment...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-comment-on-governments-cyber-investment

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 27, 2020

Cybersecurity Experts Weigh In On Jan. 28 Data Privacy Day

By shifting security left, developers are able to fix vulnerabilities faster and more effectively.
Many businesses today are software-driven and they are conscious of the role software security plays in keeping data protected. There is a greater need to ensure security is a core part of the software development process going forward. As a new data-driven decade commences, businesses should empower developers by training them on best practices in secure coding and providing the tools to enable them to find and fix vulnerabilities in their software. We know that unresolved vulnerabilities.....Read More
Many businesses today are software-driven and they are conscious of the role software security plays in keeping data protected. There is a greater need to ensure security is a core part of the software development process going forward. As a new data-driven decade commences, businesses should empower developers by training them on best practices in secure coding and providing the tools to enable them to find and fix vulnerabilities in their software. We know that unresolved vulnerabilities that pile up over time, also known as security debt, can leave organisations exposed to data breaches. Hackers will continue to look for weak points at the application layer, which is still the predominant threat vector. By shifting security left, developers are able to fix vulnerabilities faster and more effectively, improving an organisation’s overall security and ultimately better protecting sensitive data. Across Europe, more businesses are learning that they are able to adopt application security without stifling innovation.  Read Less
Like(0)  (0)

Linkedin Message

@Paul Farrington, EMEA CTO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"By shifting security left, developers are able to fix vulnerabilities faster and more effectively...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-experts-weigh-in-on-jan-28-data-privacy-day

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Paul Farrington, EMEA CTO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"By shifting security left, developers are able to fix vulnerabilities faster and more effectively...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-experts-weigh-in-on-jan-28-data-privacy-day

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Matias Madou, Co-founder and CTO, Secure Code Warrior

"It’s imperative that all developers are trained in how to code securely from the outset. "

Expert On How The UK Police Data Loss Could Have Been Easily Prevented

Stephen Kapp, CTO and Founder, Cortex Insight

"Pixlr should look to improve its internal processes by holding user information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

George Glass, Head of Threat Intelligence, Redscan

"Gamarue is able to spread across a user’s local network and is also capable of installing additional strains of malware. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Jake Moore, Cybersecurity Specialist, ESET

"Gamarue.1 is an old virus from quite a few years ago. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"New and young students using online learning for the first time are most vulnerable. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"All computers, no matter the make, model, or operating system should run some type of antivirus or anti-malware protection. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Department of Education should be putting security parameters. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Sam Curry, Chief Security Officer, Cybereason

"The National Cyber Security Centre offer free advice on secure home working. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Brian Higgins, Security Specialist, Comparitech.com

"The potential for malicious software to be used against recipients is not limited to the children. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Chloé Messdaghi, VP of Strategy, Point3 Security

"The attack approach was also clever. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Saryu Nayyar, CEO, Gurucul

"Organizations still need to maintain strong perimeter and interior defenses. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Oliver Cronk, Chief IT Architect, EMEA, Tanium

"This story is part of a wider challenge facing schools at the moment. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Andy Teichholz, Senior Industry Strategist, Compliance and Legal, OpenText

"In our new digital economy, people around the world are becoming acutely aware of how their information is being collected, stored, and used. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Lou Blatt, Senior Vice President and CMO, OpenText

"Digital is now central to almost every business interaction – generating more data for companies to manage and secure. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Greg Bell, CEO, Corelight

"This type of network infiltration is often difficult to identify. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel