Search results for: zero trust

security platform

Juniper Networks unveils AI-driven SD-WAN solution to help IT teams identify network issues

Juniper Networks announced that customers and partners can now fully deploy, configure and operate the company’s Session Smart Router (SSR) technology via the Mist cloud and AI engine. This represents a major step forward in the Juniper AI-driven enterprise across wired access, wireless access and SD-WAN domains. In addition, Juniper has expanded the already robust security capabilities of the Juniper SSR portfolio with enhanced IDS/IPS and URL filtering capabilities and made it easier to get … More

biometrics

Governments struggle to deliver secure online citizen services

Auth0 released the findings of its Public Sector Identity Index, a global research report that provides government technology leaders with insight into the identity maturity of public sector organizations around the world. The report, conducted by Market Connections, highlights the importance of a centralized identity strategy in putting safe and accessible services into the hands of citizens faster. Over the past two years, many public sector organizations were prompted by the immediate need to deploy … More

zero

Zero-trust security market to reach $64.4B by 2027

Amid the COVID-19 crisis, the global market for zero-trust security estimated at $18.3 billion in the year 2020, is projected to reach a revised size of $64.4 billion by 2027, growing at a CAGR of 19.7% over the period 2020-2027, according to ResearchAndMarkets. On-Premise, one of the segments analyzed in the report, is projected to record 19% CAGR and reach US$39.2 Billion by the end of the analysis period. After an early analysis of the … More

communication

Why is intergenerational collaboration critical in advancing zero trust security progress?

Baby Boomers play a critical role in accelerating zero trust security frameworks due to experience in integrating legacy technologies into cloud and hybrid IT environments, an Appgate study reveals. The study, based on desk research and in-depth focus groups conducted by prominent intergenerational issues author and speaker Henry Rose Lee, examines differences between Baby Boomers, Gen-Xers and Millennials and ways to harness individual strengths to develop more effective cybersecurity strategies. Key findings include: As workers … More

check

The future of security protocols for remote work

Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a real focus on establishing solid security protocols and building a strong relationship with their cybersecurity vendors. In such a landscape, we can expect to see an influx of even more cybersecurity startups cropping up to join the many that already exist. We see especially great potential in cybersecurity … More

Trend Micro

Manufacturers are starting to realize the importance of OT security

While rapid technology advances have improved manufacturing operations in recent years, combining new and legacy operational technology (OT) has created security gaps that many manufacturers are just beginning to close, according to a research report published by Information Services Group (ISG). The report finds the complex mix of legacy OT and newer, connected technologies such as industrial IoT and machine learning has forced manufacturers to add security extensions for protection against cyberattacks. “Manufacturers face a … More

Ido Helshtock

When it comes to banking security, there’s no silver bullet

In this interview with Help Net Security, Ido Helshtock, Chief Product Officer at HUB Security, talks about banking security, the most common vulnerabilities, and what banks can do to protect their own as well as their customers’ assets. As banks start to increasingly embrace digital transformation, they become more susceptible to cyberattacks. What is making them so vulnerable? The banking and finance industry has traditionally been slow to adopt new technologies because of complex concerns … More

shark

The public sector is more concerned about external than internal threats

SolarWinds announced the findings of its Public Sector Cybersecurity Survey Report. This survey includes responses from 400 IT operations and security decision makers, including 200 federal, 100 state and local, and 100 education respondents. “These results demonstrate that while IT security threats have increased—primarily from the general hacking community and foreign governments—the ability to detect and remediate such threats has not increased at the same rate, leaving public sector organizations vulnerable,” said Brandon Shopp, Group … More

security platform

Perimeter 81 Technology Alliance Partner Program delivers cybersecurity solutions for enterprises

Perimeter 81 launched Technology Alliance Partner Program (TAP) that will create an ecosystem for delivering secure networking-as-a-service at scale. The rapid adoption of cloud networking, SaaS, and Work from Anywhere is forcing organizations to rethink their security architecture. As the number of users, devices, and attack vectors rapidly increases, so does the complexity in defending modern, hybrid networks against cyberattacks. Perimeter 81’s Technology Alliance Partner Program is designed to create an ecosystem of software vendors … More

2022

2022 promises to be a challenging year for cybersecurity professionals

I am very glad to turn the page on 2021, however, I am not optimistic that 2022 will be remarkably better. I am hopeful that President Biden’s Executive Order 14028 and the Department of Homeland Security’s (DHS’s) Binding Operational Directive 22-01 (BOD 22-01) will help improve our cybersecurity practices and bolster our resilience, especially for mission critical and infrastructure protection. These mandates outline: Enhanced practices for prioritization and remediation of risk-based vulnerabilities, focusing on those … More

Patch Tuesday

Microsoft fixes wormable RCE in Windows Server and Windows (CVE-2022-21907)

The first Patch Tuesday of 2022 is upon us, and Microsoft has delivered patches for 96 CVE-numbered vulnerabilities, including a wormable RCE flaw in Windows Server (CVE-2022-21907). Vulnerabilities of note Among the publicly known flaws are a “critical” RCE in curl (CVE-2021-22947) and “important” RCE in libarchive (CVE-2021-36976) open source libraries, which have now been “fixed” in Windows 10, 11 and Server with the inclusion of the most recent versions of the libraries. But these … More

week in review

Week in review: Discussing cybersecurity with the board, APT-style attacks, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and interviews: January 2022 Patch Tuesday forecast: Old is new again Let’s look at some recent events which will be influencing this month’s patch releases. Ransomware attacks decrease, operators started rebranding Positive Technologies experts have analyzed the Q3 2021 cybersecurity threatscape and found a decrease in the number of unique cyberattacks. However, there’s been an increase in the share of attacks against individuals, … More