Remove Libraries Remove Privacy Remove Risk Remove Security awareness
article thumbnail

Security Outlook 2023: Cyber Warfare Expands Threats

eSecurity Planet

“All of this means cyber risk continues to escalate and that CISOs need to be just as nimble and methodical as the adversary.”. Software supply chain issues like the SolarWinds attack and the Log4j vulnerability have made supply chain security and software dependencies major issues in recent years. federal privacy statute.

Security 145
article thumbnail

Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind

Lenny Zeltser

Members of specific teams are typically assigned security responsibilities in the company’s security policies and procedures, which communicate expectations such as: DevOps or IT teams patch systems according to risk-based, agreed-upon timelines.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

QR Codes: A Growing Security Problem

eSecurity Planet

While QR codes offer a great way to store and access information, they come with a fair amount of risk. Also, many open source packages and libraries can generate malformed QR codes and encode common exploits, such as cross-site scripting (XSS) , local file inclusion (LFI), directory traversal , or SQL injection. Counterfeit Codes.

Security 113
article thumbnail

What Is API Security? Definition, Fundamentals, & Tips

eSecurity Planet

Additionally, as fundamental parts of this complete architecture, adherence to safe API design standards and compliance with data protection laws reinforce APIs against a variety of cyber risks. Tracking APIs helps manage potential security gaps and the risk of unauthorized entry, preventing potential points of attack.

Security 109