Skip to main content

How obfuscation can help with data breach mitigation

Data breaches are nothing new, but they have pretty consistently increased year-over-year. Despite the massive amounts of money companies invest into security to prevent breaches, they still commonly occur.

According to a report from the Identity Theft Resource Center (ITRC), 2021 saw an all-time high of data breaches, 23% more than the previous all-time high. 

While the number of data breaches has gone up, the report also showed a 5% decrease in the number of users affected by breaches. The ITRC speculates this is an indication that bad actors are focusing more on specific data types instead of mass data acquisition. 

According to John Brawner, director of support at the application security company PreEmptive, your company isn’t just vulnerable to attack on its existing products and services. They can also be vulnerable to attack in the development phase, where applications can be exposed to the possibility of piracy, tampering, and IP breaches. In fact, the average application will receive over 13,000 attacks per month during deployment, according to Contrast Security’s 2020 Application Security Observability report

Certain industries, such as software and financial services, are also more at risk from added negative side effects of breaches. In addition to the IP and data that attackers could access, companies can be found in violation of regulatory requirements specific to their industry that result in hefty fines. 

According to Brawner, one of the best ways to protect applications is by applying obfuscation. This is a practice in which code in an executable file is modified in a way such that a hacker would no longer be able to use it in any meaningful way, but the code itself remains functional.

Obfuscation modifies method instructions or metadata, and makes reverse engineering any program difficult enough that it would no longer be cost-effective. 

“Application shielding and hardening gives organizations a layer of protection against potential data breaches and intellectual property theft,” said Brawner.   

To reduce the risk of attacks on the development process wreaking havoc, companies need to invest into things like security scanning during development and layering security onto an application before it is deployed, Brawner explained. 

“With PreEmptive’s layered approach, using obfuscation, encryption, shielding and tamper proofing, applications can be developed to be difficult for hackers to read or access. Hackers rely on the ability to probe, discover and exploit vulnerabilities. By adding application obfuscation within your development process, hackers can’t identify the way the application operates or access your IP,” said Brawner.  

The post How obfuscation can help with data breach mitigation appeared first on SD Times.



from SD Times https://ift.tt/j5qKeJI

Comments

Popular posts from this blog

Difference between Web Designer and Web Developer Neeraj Mishra The Crazy Programmer

Have you ever wondered about the distinctions between web developers’ and web designers’ duties and obligations? You’re not alone! Many people have trouble distinguishing between these two. Although they collaborate to publish new websites on the internet, web developers and web designers play very different roles. To put these job possibilities into perspective, consider the construction of a house. To create a vision for the house, including the visual components, the space planning and layout, the materials, and the overall appearance and sense of the space, you need an architect. That said, to translate an idea into a building, you need construction professionals to take those architectural drawings and put them into practice. Image Source In a similar vein, web development and design work together to create websites. Let’s examine the major responsibilities and distinctions between web developers and web designers. Let’s get going, shall we? What Does a Web Designer Do?

A guide to data integration tools

CData Software is a leader in data access and connectivity solutions. It specializes in the development of data drivers and data access technologies for real-time access to online or on-premise applications, databases and web APIs. The company is focused on bringing data connectivity capabilities natively into tools organizations already use. It also features ETL/ELT solutions, enterprise connectors, and data visualization. Matillion ’s data transformation software empowers customers to extract data from a wide number of sources, load it into their chosen cloud data warehouse (CDW) and transform that data from its siloed source state, into analytics-ready insights – prepared for advanced analytics, machine learning, and artificial intelligence use cases. Only Matillion is purpose-built for Snowflake, Amazon Redshift, Google BigQuery, and Microsoft Azure, enabling businesses to achieve new levels of simplicity, speed, scale, and savings. Trusted by companies of all sizes to meet

2022: The year of hybrid work

Remote work was once considered a luxury to many, but in 2020, it became a necessity for a large portion of the workforce, as the scary and unknown COVID-19 virus sickened and even took the lives of so many people around the world.  Some workers were able to thrive in a remote setting, while others felt isolated and struggled to keep up a balance between their work and home lives. Last year saw the availability of life-saving vaccines, so companies were able to start having the conversation about what to do next. Should they keep everyone remote? Should they go back to working in the office full time? Or should they do something in between? Enter hybrid work, which offers a mix of the two. A Fall 2021 study conducted by Google revealed that over 75% of survey respondents expect hybrid work to become a standard practice within their organization within the next three years.  Thus, two years after the world abruptly shifted to widespread adoption of remote work, we are declaring 20