The top 10 security stories of 2020
Here at Hewlett Packard Enterprise and Enterprise.nxt, we know that security is a top concern to our readers. That's why we provide a stream of quality stories that not only identify potential security problems but also offer actionable advice to help you mitigate them. In recognition of Computer Security Day on Nov. 30, here is a recap of some of our stories from the past year.
In a rush to digitally transform, enterprises are embracing mobile, smart devices, machine learning, and new, more agile methods of application development, deployment, and management. Never have companies faced so much technological change. A new philosophy of security makes no assumptions about the trustworthiness of networks and the devices on them.
More often than not, container projects start out small—as experiments on developers' laptops. One developer shares with another, and after a few months of tinkering, a team brings the packaged-up microservice into the organization's production environment. After a quick security check, it will be ready to deploy. That's when things derail.
For the modern enterprise, data is both the core asset and a big problem. The whole body of company data contains the sum of company knowledge of its products, its assets, its customers, and its people.
More people are looking for ways to avoid having to touch keypads, credit cards, door handles, and everything in between. As payments via contactless methods increase, so does the interest in more ways to conduct touchless authentication.
It's painfully clear that distributed denial-of-service attacks aren't going away. DDoS attacks are getting easier to execute with more computers and devices, increased computing power, and better connectivity.
Most advice on security relates to how you use the products you have. It presumes that the products come to you in a secure and uncompromised state. But that's not always the case. Not only is it possible for a supplier's products to be compromised before you receive them, but such supply chain compromises have happened.
Container-based microservices are increasingly the architecture of choice for enterprise applications. Services running in containers are highly interconnected and also connected with distributed backing data services. Networking, therefore, is a critical component in the container ecosystem. However, due to its dynamic and highly scalable nature, container architectures present considerable challenges to enterprise data center networks.
The list of security best practices can be long, and those practices may be difficult to implement. We always have to prioritize, so which are the most important ones? The Ponemon Institute 2020 Global Study on Closing the IT Security Gap uncovered the seven best practices of high-performing organizations.
Data protection has always been a concern for IT groups, but with the massive influx of data from a multitude of sources, ensuring that the data remains accessible, available, and, most important, secure has become a more critical piece of the IT role. With downtime or data loss having extensive repercussions, it is clear that data is the lifeblood of an organization.
When the COVID-19 quarantine hit in mid-March, it created an unprecedented situation in which the number of remote workers skyrocketed beyond anything anticipated. Experts say organizations that follow best practices are in the best position to handle work from home securely.
This article/content was written by the individual writer identified and does not necessarily reflect the view of Hewlett Packard Enterprise Company.