Connect with us

Hi, what are you looking for?

HEADLINES

Phl faces increasing app-driven attacks, claims F5 Networks

The attack surface created by app-driven transformation is expanding rapidly, with 72 percent of the total number of attacks focused on user identities and applications, the gateway to personal data. As such, a larger portion of IT budgets should be allocated for the re-orientation of security around the applications.

Oscar Visaya, Country Manager at F5 Networks Philippines

The attack surface created by app-driven transformation is expanding rapidly, with 72 percent of the total number of attacks focused on user identities and applications, the gateway to personal data. As such, a larger portion of IT budgets should be allocated for the re-orientation of security around the applications.

Oscar Visaya, Country Manager at F5 Networks Philippines

This is according to Oscar Visaya, country manager of application delivery and application security solutions provider F5 Networks.

Visaya emphasized the need for a paradigm shift in how businesses and enterprises look at cybersecurity. According to him, security budgets today emphasize in less-grave risks such as protecting the network, which accounts for 90 percent of budget, with only 10 percent allocated for the most serious and common risks today which are user identities and applications.

“We cannot focus on the historical approach of incrementing forward as the application landscape is already changing the world one industry at a time. The growing number of applications, where most user data are stored, has tremendously increased the surface area of attack vectors and more apps directly mean that there are more opportunities and choices for attackers. Given this, a larger portion of IT budgets should be allocated for the re-orientation of security around the applications,” Visaya shared.

He further said that insufficient visibility and application awareness post serious security risks.

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

Advertisement