Search results for: zero trust

money

How organizations can keep themselves secure whilst cutting IT spending

It is the immediate natural reaction of most organizations to cut costs during an economic downturn. But the economy will return and cutting back too far can be damaging in the long term. Complex situations such as a global recession often make criminals more motivated. Adversaries are banking on the fact that organizations are busy trying to ride this curve and might lose sight of their security protocols. Most organizations find it impossible to balance … More

Dimitri van Zantvliet

Mounting pressure is creating a ticking time bomb for railway cybersecurity

The expansion of potential cyber threats has increased due to the integration of connected devices, the Internet of Things (IoT), and the convergence of IT and OT in railway operations. In this Help Net Security interview, Dimitri van Zantvliet is the Cybersecurity Director/CISO of Dutch Railways, and co-chair to the Dutch and European Rail ISAC, talks about cyber attacks on railway systems, build a practical cybersecurity approach, as well as cyber legislation. The railroad industry … More

week in review

Week in review: ChatGPT cybersecurity, critical RCE vulnerabilities found in git, Riot Games breached

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: BSidesZG 2023: Strengthening the infosec community in Croatia’s capital In March 2023, Zagreb will be added to the (already long) list of cities where information security professionals and enthusiasts can share their knowledge with peers at a Security BSides conference. We’ve talked with BSidesZG organizer Ante Jurjevic to find out what’s in store for those who attend. How to tackle … More

Acquisitions

Iron Bow acquires GuardSight to enhance its cybersecurity solutions

Iron Bow Technologies acquired GuardSight, a cybersecurity operations as a service (SECOPS), and managed detection and response (MDR) company that serves businesses and organizations across the U.S. The acquisition of GuardSight will enhance Iron Bow’s existing cybersecurity solutions portfolio, combining its public-sector cybersecurity engineering capabilities with GuardSight’s private-sector SECOPS and MDR capabilities. With GuardSight, Iron Bow will provide a more holistic cybersecurity offering that enables government agencies, private enterprises, and organizations to modernize their cybersecurity … More

security platform

Perimeter 81’s malware protection defends users from internet-borne threats

With continued transition to cloud services to support remote work, the threat of malware continues to grow, expanding each company’s attack surface. The first half of 2022 saw 2.8 billion malware attacks in which more than 270,000 “never-seen-before” malware variants were used, according to Sonicware’s mid-year report, up 45% from last year. Perimeter 81 added malware protection to strengthen its security offering and better protect its customers from internet-borne risks. Perimeter 81’s malware protection requires … More

Hardware

Datto introduces networking solutions for MSP and SMB markets

Datto introduced its second-generation family of cloud managed switches, along with global expansion of the early access for its secure remote access solution, Datto Secure Edge. These new networking solutions complement Datto’s existing product lines of Wi-Fi 6 access points and integrated secure routers. Additionally, Datto is giving partners new ways to purchase its networking gear. Now, MSPs and small- to medium-sized businesses can choose to buy Datto networking solutions with an up-front payment option … More

security platform

Hillstone StoneOS 5.5R10 provides ML-based threat detection for encrypted traffic

Hillstone Networks latest upgrade of its operating system, Hillstone StoneOS 5.5R10, delivers AI-based threat protection, centralized zero trust control and management, and further simplification of security operations and system optimization, among over 300 new features. The new functionality enhances the security posture of customer environments and further streamlines security operations with an easy upgrade path. Threat protection enhancements with AI technology The new StoneOS leverages AI technology to provide ML-based threat detection for encrypted traffic … More

Ante Jurjevic

BSidesZG 2023: Strengthening the infosec community in Croatia’s capital

In March 2023, Zagreb will be added to the (already long) list of cities where information security professionals and enthusiasts can share their knowledge with peers at a Security BSides conference. We’ve talked with BSidesZG organizer Ante Jurjevic to find out what’s in store for those who attend. Why did you start BSidesZG? What is your vision for the first edition of this community event? Personally, I have a strong urge to share knowledge and … More

IoT

Why most IoT cybersecurity strategies give zero hope for zero trust

IoT remains the biggest hurdle in achieving an effective zero-trust security posture across an organization. In this Help Net Security video, Denny LeCompte, CEO at Portnox, discusses how IoT has been difficult to profile accurately and why zero trust strategies fail when applied to IoT.

week in review

Week in review: Critical git vulnerabilities, increasingly malicious Google Search ads

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Cacti servers under attack by attackers exploiting CVE-2022-46169 If you’re running the Cacti network monitoring solution and you haven’t updated it since early December, now is the time to do it to foil attackers exploiting a critical command injection flaw (CVE-2022-46169). CircleCI breach post-mortem: Attackers got in by stealing engineer’s session cookie The attackers who pulled off the recent breach … More

zero

Zero trust network access for Desktop as a Service

When you support a remote workforce, you risk opening your data, applications, and organization to the world. How can you sleep soundly at night while enabling a modern “work from anywhere” workforce? Acknowledging the inherited security challenges in remote access is a good place to start. From there, design your Desktop as a Service (DaaS) offering using concepts and solutions that implement zero trust network access. Zero trust network access (ZTNA) includes technologies that provide … More

security platform

Arcserve Unified Data Protection 9.0 enhances data resilience

Arcserve unveiled Arcserve Unified Data Protection (UDP) 9.0, a centrally managed backup and disaster recovery solution that future-proofs every data infrastructure with robust protection for every type of workload. It combines complete data protection, Sophos cybersecurity protection, immutable storage, tape backup, and scalable onsite or offsite business continuity. Highlighting the need for robust enterprise data resilience strategies, a recent independent research study commissioned by Arcserve of IT decision makers (ITDMs) found that 83% of respondents … More