The recent shift towards cloud and mobility is due to the explosion of enterprise public cloud adoption. This has caused the traditional security perimeter that once protected users and internal services within the corporate network to largely disappear.
Read this guide to learn about:
Solving the IT skills...
As a result of shift to a remote workforce, network segmentation is an even more critical step for safeguarding information, says Tom Dolan of Forescout Technologies, who discusses how deployments can also help with meeting regulatory requirements.
Many businesses have new and emerging financial and reputational risks with data access controls. The complexity of digitalization and newfound data science capabilities drive greater demand for data democratization. The diversity of data consumers, data assets and data access tools continue to grow. Businesses are...
Beyond mere information sharing, collective defense is a concept that aligns public and private sectors in a unified front against cyber threats. Bill Swearingen of IronNet Cybersecurity defines the concept and how it's being employed today.
Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey. Here's what enterprises need to keep in mind when selecting security technology for IoT.
Organizations have undergone rapid network transformation in the last two months, and though the change has now stabilized into a new normal, new security concerns that affect an organization's overall risk often have not been addressed. Now that the dust has settled, many leaders are examining the transformation and...
You've read the daily headlines about security misfortunes of businesses and government organizations. The digital age (AKA the rising adoption of the internet, cloud apps, IoT, and even public WiFi) is creating an even easier playing field for cybercriminals. And the web traffic flowing through these new technologies...
Hackers tried two methods of exploiting a zero-day vulnerability in Sophos' XG firewall, but Sophos says it made a temporary fix that mitigated the risks. Attackers originally attempted to plant a Trojan, but then switched to ransomware.
Companies add tool after tool to secure their data, systems, and users. But instead of increased security, they're left with misconfigured, repetitive, or siloed tools and little visibility and control over their environments. This leads to poor cyber hygiene and creates severe security vulnerabilities, especially as...
A recently discovered cyber-espionage toolkit called Ramsay is designed to infiltrate air-gapped networks to steal documents, take screenshots and compromise other devices, according to the security firm ESET.
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.
Done right, a zero trust architecture can reduce the complexity of one's environment while also improving cybersecurity protection and efficiency. Bob Reny of ForeScout focuses on three critical considerations: visibility, compliance and control.
Vistra Energy, a Texas-based power generation firm, recently underwent a network transformation project. CISO Paul Reyes, joined by Zscaler's Dan Shelton, opens up on how to make the move to cloud-based models and what it can do to support your business.
The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust."
CISA issued a warning to organizations running Pulse Secure VPN servers that their networks may still be vulnerable to hacking even if they applied patches for a previous flaw. Attackers are now using stolen Active Directory credentials to access networks.