Rapid7 has acquired Velociraptor, an open-source endpoint-monitoring organization and community that will continue to operate as a stand-alone entity while the security firm adopts some of its technology. Meanwhile, Zscaler had announced a deal to buy Trustdome.
As a global telecom leader, Colt
Telecommunications strives to transform
the way the world works through
the power of connectivity. The Colt IQ
Network connects 900+ data centers
across Europe, Asia, and North America’s
largest business hubs, with more than
29,000 on net buildings and growing.
Customers...
Gartner reports that by 2022, 80% of new digital business
applications opened up to ecosystem partners will be accessed
through Zero Trust (ZT), and by the following year, 60% of
enterprises will phase out their remote access virtual private
networks (VPN) in favor of ZT.
As traditional security methods
lose...
More use cases are emerging for self-sovereign identity, which gives individuals more control over their digital identities, according to Heather Dahl and Ken Ebert of Indicio.tech.
No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
Remote work isn’t a trend, but a new way for businesses to operate. There’s no longer a defined parameter to operate. Instead, IT teams are coping with multiple devices, networks, locations and ways of enabling employees to access professional applications. Cybercriminals are capitalising on this opportunity.
In...
Loving your pet and creating tough-to-crack passwords should remain two distinctly separate activities. Unfortunately, Britain's National Cyber Security Center reports that more than 1 in 6 Brits admit to using the name of a pet as their password. And the problem is global.
The revelation that 533 million previously stolen Facebook account records have been made public on a darknet forum should inspire organizations to take aggressive action to further protect customer data security, some security experts say.
Synthetic identity fraud is a pervasive yet ill-defined crime – hard to define as well as to detect. Greg Woolf of FiVerity discusses a recent initiative by the Federal Reserve in Boston to better define and therefore better manage SIF.
Microsoft 365 is a powerful business productivity and collaboration suite used by over 258 million users worldwide.
Download this eBook which discusses the security implications to be aware of when using Microsoft 365 and key strategies to prevent unauthorized access, protect sensitive data and files, stop malicious...
Read the Solution Brief to learn how Fortinet solutions including email security, SaaS application security, malware protection, and identity and access management products—all part of the Fortinet Security Fabric—provide comprehensive protection for organizations using Microsoft 365.
Four editors at Information Security Media Group discuss important cybersecurity issues, including dealing with attacks targeting the aging Accellion File Transfer appliance and taking steps to enhance employee authentication.
The current COVID-19 crisis and the economic downturn has impacted budgets across departments–including IT. Luckily, it is possible to implement a robust Identity and Access Management (IAM) solution that not only keeps businesses secure, but also saves time and money.
In this eBook you will learn:
An overview...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.