The "zero trust" network architecture model is 10 years old - and suddenly more relevant than ever. How does John Kindervag, the creator of zero trust, feel about his "baby" today, and what advice does he give to organizations looking to adopt the model?
Since the COVID-19 pandemic began earlier the year, the FBI has seen an increase in nation-state hackers targeting U.S. medical research facilities and healthcare organizations conducting research into the virus.
With the massive shift to telework as a result of the COVID-19 pandemic, shadow IT is becoming a more critical security issue around the world. Security experts offer tips on mitigating the risks involved.
The U.S. Defense Department needs to improve its cybersecurity training programs for civilian and military employees to reduce the risks that common security incidents pose, a new audit from the Government Accountability Office finds.
Ads for phishing kits doubled last year on underground forums and dark net markets, with prices skyrocketing over 149 percent - an apparent indicator of strong demand, according to security firm Group-IB.
The latest edition of the ISMG Security Report offers a discussion of the potential insider threats posed by the remote workforce during the COVID-19 crisis. Also featured: An update on payment fraud shifts and the long-term outlook for the cybersecurity market.
As countries pursue national 5G rollouts, an unwanted security challenge has intensified: Some extremists have been vandalizing or even firebombing transmitter masts, driven by conspiracy theories suggesting not only that 5G poses a public health risk, but that it also helps cause COVID-19.
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
One measure of the popularity of the Zoom teleconferencing software: Cybercrime forums are listing an increasing number of stolen accounts for sale, which attackers could use to "Zoom bomb" calls and push malicious files to meeting participants. Security experts describe essential defenses.
The State Department is offering a $5 million reward for information about North Korean-sponsored hacking campaigns, according to an advisory released this week by several U.S. agencies about the ongoing threat these campaigns pose to financial institutions and others.
The remote workforce, connected devices, business resiliency - these are new concepts for many midmarket organizations now coping with the COVID-19 crisis. Kristin Judge of the Cybercrime Support Network discusses cybersecurity resources available to guide small and midsized entities.
"Zero trust" could be described as the bumper sticker for cybersecurity in 2020, but what does it actually mean? In a preview of a virtual roundtable discussion, Lisa Lorenzin of Zscaler offers a clear definition and describes how to implement it in the current environment with a growing remote workforce.