IT Security Archives – Musato Technologies
loader image

We enable business and digital transformation decisions through the delivery of cutting-edge ICT solutions and products...

Get inspired…

IT Security

Application security is more important than ever

The security of business applications is often overlooked, despite the fact that exploitation of vulnerabilities in software is one of the key attack methods of cyber criminals and that application breaches… Continue reading

How the Meltdown and Spectre security holes fixes will affect you

Get ready to patch every piece of computing gear in your home and company to deal with this CPU nightmare. You Meltdown and Spectre security can’t get away from Meltdown and Spectre. These chip bugs will make your life miserable. Everything you run — and I mean everything — PCs, Macs, iPhones, tablets, cloud computing, and servers — use vulnerable CPUs. Apple, Linux developers, and Microsoft have all released patches. And all of them will slow down at least some of your programs.-Meltdown and Spectre security

While Intel gets most of the heat for these hardware vulnerabilities, it’s not alone. According to Red Hat, ARM, IBM System Z, POWER8 (Big Endian and Little Endian), and POWER9 (Little Endian) processors are all open to attack. AMD claims its chips are largely invulnerable, but it concedes there’s a near zero — but not zero — the risk of exploitation from one class of attack.

So, what does that mean for you? Here’s what the experts say you can expect from your devices and services. Continue reading

IT Security and compliance: twin challenges call for unified response

Today, business is digital. Data of all kinds is speeding across worldwide networks to and from data centers and cloud services, even as data quantities steadily increase, fueled by low-cost storage and a burgeoning array of IT SecurityInternet-of-Things (IoT) devices. But as digital business opportunities expand, companies face a number of daunting challenges. Foremost among them is the growing number of cyber attacks, as threat actors proliferate across a variety of attack vectors. In addition, the interdependence of business and data has spawned new regulatory guidelines that span industries and geographic regions. To survive and thrive, businesses must meet the twin challenges of IT security and compliance.

IT Security Challenges: Threat Actors

Today’s IT security threats come from a wide array of perpetrators who are responsible for ever-more dangerous attacks. Continue reading