In theory, modern web frameworks provide secure ways of accessing databases, making SQL injections a non-issue. The reality looks much different. Among other injection vulnerabilities, SQL injections are still atop the OWASP Top 10, and organizations still frequently fall victim. Therefore there is no way around software security testing solutions that can reliably detect SQL injections.
IHG Hotels & Resorts, the hotel group that owns the Holiday Inn and Intercontinental brands, experienced a cyber attack in the first week of September. The attack has impacted the central hotel’s booking system and mobile apps, causing a service outage for several days. Loyalty program members could not log in or create new bookings during this time.
Security operations professionals are constantly being pushed to the edge of their capacities. They’re dealing with endless manual processes and managing tasks sequentially, because of the limitations of their security tools and options. They’ve dreamed of being able to execute more tasks simultaneously to quickly enrich, analyze, contain, and resolve security threats. Today, Torq is proud to introduce Parallel Execution, which makes those capabilities a reality.
In today’s business climate, more companies are looking for ways to enable their employees to work remotely. While this can certainly have its benefits, it also presents a unique set of challenges – not the least of which is how to keep your data secure. That’s where multi-factor authentication (MFA) comes in.
Although application security and compliance are relatively modern concerns, they impact every industry that uses technology, even traditional industry sectors such as manufacturing. Most manufacturers that do business on a large scale have embraced technology as a necessary business component in the digital economy. Many manufacturers have built heavily integrated functions across the entire manufacturing process, as well as tying in related areas such as operations and logistics.
For the next interview in our series speaking to technical leads from around the world, we’ve welcomed experienced cybersecurity specialist and author Greg Scott.