SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news
Story image

Data security: the new frontier of app protection

FYI, this story is more than a year old

With European General Data Protection Regulation  coming into effect recently, many organisations are fearful of becoming the first to experience a data breach and be burdened with the heavy costs for non-compliance under the much stricter regulations. As more personal data is stored and processed in apps, the app is becoming a prime target for cybercriminals, and therefore a weak point for GDPR compliance.

Given that 93% of web application attacks are attributed to organised crime and 77% of these are botnet-related, in a post-GDPR world, businesses need to make apps a central part of their security strategy to avoid data breaches and the monetary and reputational damages they cause to an organisation. Properly securing apps can help reduce the fear businesses are experiencing over not maintaining compliance.

The new regulation provides EU citizens with more protection over their personal data and how it is used by businesses. The nature of the legislation means that it will affect businesses that not only sell to the EU, but also those who hold the personal data of EU citizens, have an establishment in the EU, or monitor the behaviour of EU citizens. This means that businesses need to ensure that their data is adequately protected now or they could be liable to GDPR fines.

Complying with the 72-hour notification of breaches rule

GDPR requires businesses to step up and ensure secure data storage and optimal reporting mechanisms for data breaches.

The 72-hour notification of breaches rule under GDPR, means that businesses need to have a strong security strategy in place in order to be able to identify breaches fast and disclose them within this strict time frame. Ensuring that businesses have visibility of encrypted app traffic leaving the business is crucial in order to guarantee compliance with this rule. As businesses are still bound by GDPR if they interact with EU citizens, securing personal data is necessary in order to avoid the heavy costs of non-compliance.

Apps are a key target for cybercriminals

F5 labs research has found that apps are the initial target for 53% of data breach attempts, making them the biggest target for cyber-security attacks. Even more worrying, experiencing cyber-attacks on apps isn't enough to change a business' security strategy, with 46% of IT professionals admitting that they rarely make changes to their security strategy, even after a breach has occurred.

In a post-GDPR world, organisations need to wake up to the threat that cyber-attacks can pose to their operations and develop strategies built around ensuring app security. As the recent example of the MyFitnessPal app which was hacked and resulted in the personal data of 150 million users being compromised demonstrates, app security is essential for all businesses to avoid compromising the personal data of users.

Where should companies start?

Due to the fact that apps are such a crucial component of any businesses' security strategy, businesses need to start taking a security first approach to begin effectively securing their apps.

As apps are increasingly being adopted and used by both consumers and businesses, malicious access attempts to break through authorisation and authentication log-ins are inevitable. Implementing a centralised access gateway is a step that organisations can take to manage and secure authentication. Incorporating multi-factor identification into a business' security strategy is another useful way to protect personal data that is collected by apps.

With a two-fold rise in DDoS attacks during the first quarter of 2018, establishing effective security against these types of attacks can go a long way in securing personal data. Implementing a Web Application Firewall (WAF) not only allows behavioural analysis to be performed to determine legitimate users from malware, but it can also detect and stop DDoS attacks on apps before personal data is compromised.

Threat modelling, vulnerability scanning and risk modelling

There are some key solutions that are crucial in assisting businesses with maintaining app security. Threat modelling allows businesses to determine the likelihood of cyber threats, the motivation of cyber attackers, and build a comprehensive list of the all the possible ways apps could potentially be breached.

Then, vulnerability scanning can pinpoint where apps are most exposed to threats and allow for a risk model to be developed to prioritise which areas of risk to focus most resources on. This makes the procedure of securing apps more efficient for organisations.

Focus on app security

Businesses need to think about the data regulation landscape that GDPR places businesses in. By taking immediate steps to identify where they are vulnerable to threats and establishing visibility of cyber-attack attempts, businesses can help ensure that their apps are solidly protected to avoid exposing personal data. Making app security an essential part of security strategies can help protect against the threat of GDPR non-compliance.

Related stories
Top stories
Story image
Security Information and Event Management
LogRhythm announces LogRhythm Axon and new solution enhancements
According to the company, Axon provides an easier way for security teams to achieve better visibility across both cloud and on-prem log sources, helping further establish a foundation for their security practices.
Story image
Virtual Private Network
BT enhances global Cardway portfolio with Mako Networks
BT has announced a significant enhancement to its Cardway portfolio of payment solutions following the signing of a global agreement with Mako Networks.
Story image
Cybersecurity
Swift successfully pilots its Securities View capability
The new capability significantly increases transparency in post-trade processing while preventing costly settlement fails; it will be widely available in 2023.
Story image
Cybersecurity
Continuous attack attempts discovered on Atlassian Confluence zero day
Following a coordinated disclosure of a zero-day vulnerability by Volexity in Atlassian Confluence, attackers went wild to exploit it.
Story image
Ransomware
Commonwealth tackling rising cybercrime threat in Asia
Ransomware, identity theft, and virtual security attacks identified as growing threats to security and economic growth.
Story image
Microsoft
Yubico research finds concerning trends around authentication security practices
A new global survey from Yubico has found that 59% of employees still rely on usernames and passwords as the primary method to authenticate their accounts.
Story image
Apple
Jamf shows intent to acquire mobile security firm ZecOps
This acquisition positions Jamf to help IT and security teams strengthen their organisation’s mobile security posture.
Story image
Work from home
Jamf showcases new products to simplify and secure work
At the 13th annual Jamf Nation User Conference, the company shared how its continuous product innovation is helping organisations succeed with Apple.
Story image
Ransomware
Delinea updates DevOps security, remote access more seamless
New enhancements include development support on the most recent Mac computers and improved secrets' management usability through automation.
Story image
Partner Programmes
Trellix set to launch new unified partner program in 2023
"We co-developed the Xtend program with our partners to create the right business model for deploying Trellix XDR."
Story image
Edge Security
Security practices for modernising the “spaghetti” of on-premises IT
Many organisations are wondering how to securely modernise their workload, often made up of a “spaghetti” of on-premises applications and management consoles.
Story image
Artificial Intelligence
Fortinet advances AIOps to aid the hybrid workforce
"We’re continuing our commitment to AI innovation by delivering AIOps capabilities across our robust portfolio of enterprise networking technology."
Story image
IT Training
Six ways to transform your cybersecurity training and influence lasting change
If the goal is to win hearts and minds, formal awareness training can fall short and often doesn’t inspire people to care.
Story image
Phishing
Vectra Protect team finds Microsoft Teams vulnerability
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
Story image
Cloud
How modern IT architectures are moving beyond network visibility
Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
Story image
Cybersecurity
Employees unsure who to go to to report security incident
A new study shows more than 20% of the untrained global workforce do not know who to contact during a security breach.
Story image
Secure Code Warrior
Secure Code Warrior announces Coding Labs innovation
Coding Labs mechanisms allow developers to move from learning to applying secure coding knowledge more efficiently, leading to fewer code vulnerabilities.
Story image
Threat intelligence
Trellix advances threat intelligence with new research centre
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Story image
Cloud Security
75% of AU companies had cloud security incident in past year
According to new Venafi research, complexity is due to increase, as companies plan to host more applications in the cloud.
Story image
Kaspersky
Cybersecurity loopholes prevalent in South East Asia
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
Story image
Firewall
Forrester names Akamai as web application firewall leader
"We continually monitor and improve our capabilities to defend customers from new threats, while enabling customers to protect evolving attack surfaces."
Story image
Malware
Kaspersky uncovers new malicious malware NullMixer
Kaspersky researchers have uncovered a new malware stealing users credentials, address, credit card data, cryptocurrencies, and accounts.
Story image
Distributed Denial of Service
Sysdig reveals a loss of $53 for every $1 cryptojackers gain
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Story image
Software-as-a-Service
Enterprises yet to fully commit to cybersecurity - CompTIA
“Digital transformation driven by cloud and mobile adoption requires a new strategic approach to cybersecurity, but this poses significant challenges."
AWS Marketplace
Whitepaper: A practical guide for mitigating risk in today’s modern applications
Link image
Story image
Cybersecurity
De-risking the innovation cycle – a modern, real-time approach to security
Many organisations see cybersecurity as an inhibitor of innovation, with burdensome protection measures standing in the way of progress and speed.
Story image
Data Protection
99% of security experts unhappy with tokenisation investment
Cybersecurity experts are looking for a solution that provides the strength of tokenisation while removing the friction that has accompanied it in the past.
Story image
Cybersecurity
Ransomware attacks continue to increase, report finds
Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months.
Story image
Virtual Private Network
95% of organisation rely on VPN as threats continue - report
There is a growing number of VPN-specific security threats and a need for Zero Trust security architecture in enterprise-level organisations.
Story image
Malware
Decrease in malware volume, but surge in encrypted malware
The Q2 Internet Security Report found office exploits continue to spread more than any other category of malware.
Story image
Data Protection
Cloudflare brings Data Localisation Suite to more APAC businesses
This allows any business in these countries to service their data locally while benefiting from the speed, security, and scalability of Cloudflare’s global network.
Story image
Legacy
Trellix enables greater cyber resiliency with extended XDR platform
"Legacy SIEM technology has failed to modernise security operations. We are confident Trellix XDR fills this critical gap.”
Story image
Cybersecurity
Video: 10 Minute IT Jams - An update from SearchInform
Val Novoselova joins us today to to discuss new trends in the information security space, and how SearchInform is adapting to some of the new trends we are seeing.
Story image
Cybersecurity
Test your API Security with Infinite API Scanner
The effectiveness of API scanning technology can mean the difference between successful and unsuccessful programming outcomes, and often enterprises and IT leaders struggle to get it right.
Story image
Hybrid Cloud
Hybrid cloud security driving need for deep observability
Gigamon is bringing application and network-level intelligence together to help network, security, and cloud IT operations teams eliminate security blind spots.
Story image
Firewall
Barracuda accelerates growth in its data protection business
Barracuda cloud-to-cloud backup protects against evolving cyber threats, such as ransomware, and is now transactable in the Azure Marketplace.
Story image
Network Management
Fortinet introduces enhanced AIOps across its gateways
FortiAIOps builds on Fortinet's rich history of developing artificial intelligence to deliver actionable network insights for self-optimising management.
Aws Marketplace
Learn how to implement a backup and recovery plan for a new generation of Kubernetes-based modern applications
Link image
Story image
Software-as-a-Service
Varonis adds secrets discovery to data classification
The data security firm announces enhancements that detect and remediate overexposed private keys, encryption certificates, API keys, and authentication tokens.
Story image
Cybersecurity
Best practices for industrial cyber resilience
Operational technology (OT) security is gaining more attention than ever before, but sufficient understanding of what it takes to prevent breaches is still lacking amongst many organisations.
Story image
Enterprise
Delinea shares the importance of PAM, partners and security for modern enterprise
Identity-based security is becoming a crucial tool for modern enterprises as they continue to adapt to different working environments.
Story image
Mobile Device Management
How to easily scale your mobile workforce and devices for the peak shopping season
Retailers are under constant pressure to streamline processes and become more efficient while looking for ways to improve customer satisfaction levels.