The Latest in IT Security

You Want to Automate Your Security Architecture – Now What?


The biggest cybersecurity challenge in enterprise remains keeping ahead of the “bad guys.” As fast as security gaps are plugged, new vulnerabilities appear and are targeted for the next attack. Criminals have been using automation for some time, leveraging tools like AutoSploit to automate internet scanning and exploitation, or Sentry MBA for credential stuffing by harnessing proxies to conduct attacks. We have also seen hackers use automation tools to infiltrate networks and gather data or create user accounts for future plans. As their tools mature, the volume of automated attacks will increase, and we will see more and more successful breaches being carried out by software.

Read More

Leave a reply


SATURDAY, MAY 21, 2022

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments