Here are some considerations and best practices that developers, IT operations professionals, and system administrators should take into account in securing the infrastructures that power the applications they use.
In a highly publicized data breach incident, rideshare application Uber announced that the personal information of 57 million customers and drivers were potentially compromised in October 2016.
DJI, one of the largest drone manufacturers in the world, was the subject of an information exposure incident when a researcher discovered that it left the private key for its HTTPS certificate on GitHub for four years.
Misconfigured cloud servers continue to be a problem. As cloud services are rapidly gaining ground globally and across all industries, many organizations adopt the technology without fully securing it.
Enterprises are moving towards virtualization and cloud computing. However, adopting these new platforms opens new windows of exposure that can be leveraged in data breach attacks.