Search results for: zero trust

zero trust

Why zero trust should be the foundation of your cybersecurity ecosystem

For cybersecurity professionals, it is a huge challenge to separate the “good guys” from the “villains”. In the past, most cyberattacks could simply be traced to external cybercriminals, cyberterrorists, or rogue nation-states. But not anymore. Threats from within organizations – also known as “insider threats” – are increasing and cybersecurity practitioners are feeling the pain. Traditional perimeter defenses are not designed to prevent these attacks. They also struggle to keep external attackers out. Clever hackers … More

colors

How the CIO’s relationship to IT security is changing

In this Help Net Security video, Joe Leonard, CTO at GuidePoint Security, illustrates how the role of the CIO is changing as cybersecurity priorities and responsibilities are creeping into the job description. Globally, CIOs find it most difficult to solve challenges related to data privacy/security (66%) and cybersecurity/ransomware (66%), according to a global research study from Lenovo. From zero trust implementations to network segmentations, CIOs are navigating a cybersecurity battlefield with often little background and … More

project zero trust

Introducing the book: Project Zero Trust

In this Help Net Security video interview, George Finney, CSO at Southern Methodist University, talks about his latest book – “Project Zero Trust: A Story about a Strategy for Aligning Security and the Business“. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company’s new IT Security Director. Readers will learn John Kindervag‘s 5-Step methodology for implementing Zero Trust, the four Zero Trust … More

New infosec products of the week: September 23, 2022

Here’s a look at the most interesting products from the past week, featuring releases from 42Crunch, Cloudflare, Code42, Commvault, and Onfido. Code42 Incydr enhanced detection monitors Git to protect source code and avoid IP theft Code42 has enhanced source code exfiltration detection within its Code42 Incydr product to specifically support Git push commands to personal or unsanctioned code repositories, whether GitHub, Bitbucket, Azure DevOps, and other Git-supported platforms. Incydr detects and prioritizes data transfer to … More

Appointments

BioCatch hires Jonathan W. Daly as CMO

BioCatch announced that Jonathan W. Daly has joined the company as Chief Marketing Officer. With more than 25 years of executive marketing experience in high-growth technology companies, Jonathan W. Daly will be responsible for leading the development and communication of BioCatch’s marketing vision and brand strategy for the next stage of growth while expanding its fraud detection market leadership worldwide in key sectors including financial services, telecommunications and fintech. Since 2020, BioCatch has more than … More

security platform

Cloudflare integrates CASB and DLP services into its zero trust platform

Cloudflare has unveiled that both its Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP) services are now available as part of Cloudflare’s zero trust platform. Cloudflare CASB provides businesses visibility and control across their corporate SaaS applications to secure workplace tools, detect shadow IT, and control user access. Cloudflare DLP customers have increased protection and controls over data flowing across their network—detecting and preventing data exfiltration, scanning for Personally Identifiable Information (PII), and … More

Handshake

Lookout extends collaboration with Verizon to bring data-centric cloud security to businesses

Lookout has expanded its partnership with Verizon to deliver the Lookout Cloud Security Platform to Verizon business customers. The Lookout Cloud Security Platform helps safeguard an organizations’ data, identify and mitigate threats and facilitates secure access to the web, private apps and cloud services (SaaS) deployed in a multi-cloud environment. The Lookout Cloud Security Platform safeguards data everywhere it goes While cloud connectivity has boosted productivity and collaboration, it has also amplified security gaps as … More

glasses

20/20 visibility is paramount to network security

Infoblox announced the results of a Forrester Consulting study, which found IT leaders around the world share a ubiquitous appetite for greater network visibility. The findings underscore a convergence in security with networking, which IT decisionmakers now view as the missing strategy that will improve security response, automate compliance tasks, and better manage processes and outcomes. Having 20/20 visibility is paramount to network security, because it helps organizations discover and understand what data they are … More

data

Take cybersecurity out to where employees and data are coming together

Every morning, we wake up and chances are, we start immediately accessing and consuming information. Whether it’s accessing personal emails, downloading sales reports, or paying bills, we’re switching devices constantly, and are used to managing both our personal and work lives from anywhere. Cybercriminals are keenly aware that users are constantly switching between personal and corporate devices, or even blurring the lines between the two. Thanks to cloud technologies, we’ve made huge convenience and productivity … More

Apple

Securing your Apple device front through unified endpoint management

Apple has always touted the security and privacy capabilities of their devices. Being responsible for both the hardware and the associated OS has allowed Apple to create a closed-end approach to shield users against some common attacks. But it’s possible that the added security isn’t as foolproof as you might have thought. The pair of vulnerabilities in Apple devices that has recently surfaced is a prime example. The vulnerability impacted iPhones, iPads, and Macs and, … More

week in review

Week in review: Uber hacked, QNAP NAS devices under attack, 5 Kali Linux books to read this year

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593) QNAP Systems has provided more information about the latest DeadBolt ransomware campaign targeting users of its network-attached storage (NAS) devices and the vulnerability the attackers are exploiting (CVE-2022-27593). 5 Kali Linux books you should read this year Kali Linux is a Linux distribution designed for digital forensics, penetration testing, security … More

security platform

ForgeRock enhances its identity platform to provide personalized and secure user experiences

ForgeRock has enhanced its identity orchestration capabilities to enable enterprises to more easily deliver customer and employee experiences secured by AI-driven threat protection. Limitations of typical Identity systems make creating highly personalized and secure digital experiences costly, time consuming, and difficult. ForgeRock’s identity orchestration, also known as Intelligent Access Trees, provides a no-code approach that is built natively into its unified platform and connects multiple systems and processes to give users a seamless online journey. … More