Connect with us

Hi, what are you looking for?

HEADLINES

Phl faces increasing app-driven attacks, claims F5 Networks

The attack surface created by app-driven transformation is expanding rapidly, with 72 percent of the total number of attacks focused on user identities and applications, the gateway to personal data. As such, a larger portion of IT budgets should be allocated for the re-orientation of security around the applications.

Oscar Visaya, Country Manager at F5 Networks Philippines

The attack surface created by app-driven transformation is expanding rapidly, with 72 percent of the total number of attacks focused on user identities and applications, the gateway to personal data. As such, a larger portion of IT budgets should be allocated for the re-orientation of security around the applications.

Oscar Visaya, Country Manager at F5 Networks Philippines

This is according to Oscar Visaya, country manager of application delivery and application security solutions provider F5 Networks.

Visaya emphasized the need for a paradigm shift in how businesses and enterprises look at cybersecurity. According to him, security budgets today emphasize in less-grave risks such as protecting the network, which accounts for 90 percent of budget, with only 10 percent allocated for the most serious and common risks today which are user identities and applications.

“We cannot focus on the historical approach of incrementing forward as the application landscape is already changing the world one industry at a time. The growing number of applications, where most user data are stored, has tremendously increased the surface area of attack vectors and more apps directly mean that there are more opportunities and choices for attackers. Given this, a larger portion of IT budgets should be allocated for the re-orientation of security around the applications,” Visaya shared.

He further said that insufficient visibility and application awareness post serious security risks.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

AI-enabled adversaries increased operations by 89% year-over-year, weaponizing AI across reconnaissance, credential theft, and evasion.

HEADLINES

Enterprise complexity is working in the attackers' favor — identity weaknesses were exploited in 89% of investigations, while 87% of attacks involved multiple attack...

HEADLINES

AI-first businesses – those integrating AI into key processes and offerings from the outset rather than as a secondary enhancement – are hurtling towards...

HEADLINES

The acquisition is an important step in Sophos’ strategy to help organizations strengthen cybersecurity strategy and governance across all levels of maturity, delivered through...

HEADLINES

Critical infrastructure all over the world is under threat from highly organized, state-sponsored “espionage ecosystems”. These loosely knit but well-resourced organizations are deploying a...

HEADLINES

The agreement marks a significant step in the evolution of Carbon Markets 2.0, as governments and investors increasingly demand real-time verification, auditability, and transparency across...

HEADLINES

Cybersecurity experts urge users to be particularly cautious this year, as AI enables even more realistic scams, and are offering tips on how to...

HEADLINES

Built around the Sophos Protected Browser, powered by Island, the solution enables organizations to protect applications, data, users, and guests wherever work takes place,...

Advertisement