Search results for: zero trust

VPN

65% of companies are considering adopting VPN alternatives

Despite high awareness of VPN risks, remote work forced many companies to rely more heavily on legacy access methods during the pandemic. At the same time, cybercriminals continue to take advantage of long-standing security vulnerabilities and increased attacks on VPNs, according to Zscaler’s VPN Risk Report. “As evident in several high profile breaches and ransomware attacks, VPNs continue to be one of the weakest links in cybersecurity. Their architecture deficiencies provide an entry point to … More

security platform

Netography upgrades Fusion platform to address encryption and multi-platform gaps

Netography announced further innovation to its Netography Fusion platform, delivering scalable, continuous network visibility and control required by security operations center (SOC) and cloud operations teams. Netography Fusion enables organizations to significantly reduce cyber threat risks and costly downtime in real-time with improved security and business context, as well as powerful remediation automation capabilities through alerts, custom detections, and integrations. The platform is the only security product that secures the Atomized Network—including legacy, on-premises, hybrid, … More

Handshake

Elevate Security partners with Booz Allen Hamilton to combat advanced cybersecurity attacks

Elevate Security and Booz Allen Hamilton announced a strategic partnership that aligns Booz Allen’s cybersecurity consulting services with Elevate’s human cyber risk quantification and mitigation software to address the human element of cybersecurity risk. Booz Allen’s Commercial team will leverage Elevate’s vast cyber risk intelligence capabilities to deliver rapid risk assessments and provide deep visibility to organization-wide internal cyber risk. Additionally, Elevate will power the Booz Allen Commercial team’s Dynamic Cyber Trust solution, which adapts … More

Handshake

Votiro collaborates with Owl Cyber Defense to prevent file-borne threats from entering secure networks

Votiro announces partnership with Owl Cyber Defense to ensure secure file transfers into isolated government ministry networks. Through this collaboration, Votiro’s CDR solution will integrate with Owl’s hardware-enforced data diode and cross domain solutions to ensure secure file transfers into isolated government ministry networks. Attacks on government ministries have been steadily increasing over the past few years. Earlier this year, researchers voiced concern over an influx of targeted attacks on military industrial complex enterprises and … More

remote workforce protection

Businesses find remote work security risks less daunting than before

After two years of the pandemic, confidence in addressing certain security risks and threats arising from hybrid and remote work has improved among businesses and organizations around the world. When it comes to secure access to applications, data, and systems, 84% of IT professionals this year said they have some degree of confidence in their current user access security systems to enable remote work securely and easily, compared to 56% in 2021, according to a … More

Video lock

Cloudflare announces Zero Trust SIM to help organizations secure mobile employee devices

Cloudflare announced the development of the Cloudflare Zero Trust SIM, a solution that secures every packet of data leaving mobile devices. With the Zero Trust SIM that Cloudflare is developing, organizations will be able to quickly and securely connect employee devices to Cloudflare’s global network, directly integrate devices with Cloudflare’s Zero Trust platform, and protect their network and employees no matter where they are working from. Additionally, Cloudflare will be launching Zero Trust for Mobile … More

security platform

Fortinet introduces new and enhanced AIOps capabilities across its entire networking portfolio

Fortinet announced enhanced AIOps capabilities across its entire networking portfolio, including the artificial intelligence-based network operations management for 5G/LTE gateways. When combined with the latest AIOps enhancements to Fortinet’s Secure SD-WAN and Wired/Wireless LAN portfolio, network operations teams have access to even more dynamic insights and event correlation across their entire network, making FortiAIOps the most complete AIOps network management platform in the industry. Growing urgency for AI-enhanced network automation With accelerated digital innovation and … More

zero trust

Why zero trust should be the foundation of your cybersecurity ecosystem

For cybersecurity professionals, it is a huge challenge to separate the “good guys” from the “villains”. In the past, most cyberattacks could simply be traced to external cybercriminals, cyberterrorists, or rogue nation-states. But not anymore. Threats from within organizations – also known as “insider threats” – are increasing and cybersecurity practitioners are feeling the pain. Traditional perimeter defenses are not designed to prevent these attacks. They also struggle to keep external attackers out. Clever hackers … More

colors

How the CIO’s relationship to IT security is changing

In this Help Net Security video, Joe Leonard, CTO at GuidePoint Security, illustrates how the role of the CIO is changing as cybersecurity priorities and responsibilities are creeping into the job description. Globally, CIOs find it most difficult to solve challenges related to data privacy/security (66%) and cybersecurity/ransomware (66%), according to a global research study from Lenovo. From zero trust implementations to network segmentations, CIOs are navigating a cybersecurity battlefield with often little background and … More

project zero trust

Introducing the book: Project Zero Trust

In this Help Net Security video interview, George Finney, CSO at Southern Methodist University, talks about his latest book – “Project Zero Trust: A Story about a Strategy for Aligning Security and the Business“. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company’s new IT Security Director. Readers will learn John Kindervag‘s 5-Step methodology for implementing Zero Trust, the four Zero Trust … More

New infosec products of the week: September 23, 2022

Here’s a look at the most interesting products from the past week, featuring releases from 42Crunch, Cloudflare, Code42, Commvault, and Onfido. Code42 Incydr enhanced detection monitors Git to protect source code and avoid IP theft Code42 has enhanced source code exfiltration detection within its Code42 Incydr product to specifically support Git push commands to personal or unsanctioned code repositories, whether GitHub, Bitbucket, Azure DevOps, and other Git-supported platforms. Incydr detects and prioritizes data transfer to … More

Appointments

BioCatch hires Jonathan W. Daly as CMO

BioCatch announced that Jonathan W. Daly has joined the company as Chief Marketing Officer. With more than 25 years of executive marketing experience in high-growth technology companies, Jonathan W. Daly will be responsible for leading the development and communication of BioCatch’s marketing vision and brand strategy for the next stage of growth while expanding its fraud detection market leadership worldwide in key sectors including financial services, telecommunications and fintech. Since 2020, BioCatch has more than … More