High-profile security breaches are being reported in the news every week. Organizations in healthcare, energy, government and many other industry sectors are constantly targeted by cyberattacks.
Cybersecurity
IT organizations are under constant pressure to optimize resources, increase efficiency, improve security and reduce expenses, but aging technology often gets in the way. It’s estimated that outdated systems make up nearly a third of the typical organization’s IT environment, which makes it extremely challenging to achieve the potential benefits of rapidly evolving technologies.
“Trust no one.”
That was one of the taglines for The X-Files, the popular science-fiction television series about FBI agents who investigate a series of bizarre, supernatural cases. It’s also becoming a mantra for modern network security.
“Maturity” might seem an odd word to apply to security. As attacks become more frequent and complex, organizations need the agility to respond to new forms of cybercrime. Old ways of thinking are seldom useful in the ever-changing world of IT.
Security analysts are alarmed about a bug in software few people know about — the Log4j logging utility for Java applications. In November, researchers identified a zero-day exploit that affected the Java version of the Minecraft video game. Hackers were able to trick Log4j into storing specific character strings that allowed them to take control of the compromised machine. The hackers could then execute malicious code remotely, spread malware or steal sensitive information.