From identity and access management to cloud migration and connected devices, retired RSA CEO Art Coviello looks beyond the pandemic and says, "It's going to be a Roaring '20s for technology." But he also foresees a potentially calamitous decade for security.
What is the essence of zero trust? Just what the name implies. Don’t trust anything. No individual. No endpoint. No application. No network. Organizations should not automatically trust anything inside or outside their perimeters. In fact, the idea of a perimeter — the castle-and-moat approach to security — is...
Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a...
Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a...
Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a...
The U.S. Cybersecurity and Infrastructure Security Agency and the National Institute of Standards and Technology have released a report providing insights on how to enhance supply chain security in the wake of the SolarWinds attack.
No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
Adopting the "zero trust" model is essential to ensuring security as organizations use more IoT devices, says Fred Streefland of Hikvision, a Chinese company that manufactures video surveillance equipment. He addresses misconceptions about the model.
We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps? Sasi Murthy of Netskope discusses the path to zero trust data protection.
It can no longer be a topic of debate. If you have enterprise assets connected to the Internet, you will get breached. It is only just a matter of when. Every organization, especially in today’s work-from-home economy must have a documented incident response plan and sets of playbooks that form the incident response...
If trust exists on a continuum with no trust at one end and complete trust at the other, where does trust in someone’s identity lie? It’s somewhere in between - pushing closer to no trust, in the interest of security, but not quite yet reaching the “zero trust” ideal on which we’ve fixed our gaze.
Join...
The "zero trust" model is outdated in today's cloud environment, says Ian Thornton-Trump, CISO at Cyjax, a threat intelligence company, who recommends the use of segmentation and monitoring for anomalous behavior instead.
2020 was a culmination of market shifts that has become a catalyst for the adoption of Identity Governance and Administration (IGA)—from work from home to the implementation of a zero-trust strategy.
In a new survey from Omada and Enterprise Strategy Group, 93% of your peers agree that the COVID-19 outbreak has...
Four editors at Information Security Media Group - Tom Field, Anna Delaney, Mathew Schwartz and Tony Morbin - review this week’s most important cybersecurity developments, from nation-state threats and supply chain risk, to combating ransomware and adopting a zero trust strategy.
This edition of the ISMG Security Report features an analysis of the Microsoft Exchange on-premises server hacks – from who might have leaked the vulnerability exploits to how ransomware gangs are taking advantage of the flaws. Also featured: Tackling the cybercrime business model; assessing "zero trust."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.