HomeVulnerabilityBeware cybersecurity tech that’s previous its prime — 5 areas to verify...

Beware cybersecurity tech that’s previous its prime — 5 areas to verify or retire

“Once we choose distributors, we inform them we’re not going to situation a password or perhaps a token or a key, these are all examples of static authenticators,” he says. “However we’re additionally practical, so if there’s a product we want that requires passwords, then we require passwords to be rotated incessantly. For us, the usage of static credentials has turn out to be the exception, not the rule.”

2. Obligatory scheduled penetration testing

Though not a particular security device, however necessary scheduled pen testing is cited by some as an outdated technique.

Attila Torok, CISO at tech firm GoTo, for one, believes these once- or twice-a-year penetration checks finished to fulfill regulatory or vendor necessities don’t successfully consider a company’s true security posture. Reasonably, he says they seize solely a snapshot of the surroundings’s security at one date in time.

See also  Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Methods
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular