Why organizations are keen on zero trust but are slow to adopt it

Why organizations are keen on zero trust but are slow to adopt it

Most organizations surveyed by Banyan Security consider zero trust a priority, but many see it as difficult and expensive to implement. Image: metamorworks, Getty Images/iStockphoto As cyberattacks have increasingly threatened organizations, zero trust has become more of a go-to method for protecting sensitive data and assets. Zero trust lets you limit access on an as-needed basis, and with the promise of greater protection, it is on the radar for many organizations. But adopting this type…

Read More

Powering a low-carbon digital Thailand

Powering a low-carbon digital Thailand

In the journey toward a low-carbon future, Thailand is the first country in the Association of Southeast Asian Nations (ASEAN) to commit to carbon neutrality. At the 2021 United Nations (UN) Climate Change Conference, commonly referred to as COP26, Thailand proposed the visionary Carbon Neutrality 2050 roadmap to address climate change, mirroring the milestone laid out by the European Union (EU). In this truly momentous journey, digitalization will play a crucial role as we work…

Read More

Connected Justice and the rapid change in technology

Connected Justice and the rapid change in technology

COVID-19 brought numerous changes to the world of government and technology while ushering in an urgency to embrace technology in every aspect of operations. Our justice system was one of the most critically affected segments of our government. One of the most resistant to technological change, the justice system was thrust into a rapid scramble to adapt to this “new normal.” County, state, and federal courts were immediately challenged to find a solution to continuing…

Read More

Maintaining cybersecurity as digital identities expand

Maintaining cybersecurity as digital identities expand

<!– Maintaining cybersecurity as digital identities expand | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Per Mar Security remains resilient as threats evolve

Per Mar Security remains resilient as threats evolve

As an early adopter of Cisco Secure Endpoint, Per Mar Security Services has seen the product evolve alongside the threat landscape. According to Dan Turner, CIO at Per Mar, the evolution of the Cisco security portfolio has helped the company remain cyber resilient during the pandemic and beyond. We recently spoke with Turner to discuss how Per Mar uses Cisco technology to rapidly detect and mitigate threats, while still enabling employees to work from wherever…

Read More

API insecurity costing the US billions annually

API insecurity costing the US billions annually

<!– API insecurity costing the US billions annually | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How the Cloud Upended Security – and How Encryption Helps Restore It

How the Cloud Upended Security – and How Encryption Helps Restore It

By Tilo Weigandt, co-founder, Vaultree Data is everywhere and anywhere, and as a result, data management is out of control. Once a user or customer has signed up for a service or purchased a product, they usually have no idea about where their data is being stored, with whom it is shared or how it is secured. The adoption of cloud services – while very beneficial in many ways – have made it nearly impossible…

Read More

Proofpoint: Social engineering attacks slipping past users

Proofpoint: Social engineering attacks slipping past users

Some of the most effective tricks used for social engineering attacks are being overlooked or underestimated. That’s according to security vendor Proofpoint, whose 2022 Social Engineering report concluded that many companies mistakenly assume that cybercriminals are unwilling or unable to use tactics such as extended conversations, legitimate services and hijacked email threads in order to dupe their targets into opening malware and following phishing links. Proofpoint, which specializes in tools and services to counter…

Read More

Before, during and after a cyberattack

Before, during and after a cyberattack

<!– Before, during and after a cyberattack | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties

#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties

Organizations are still neglecting to secure their supply chains, according to panellists at a session during Infosecurity Europe 2022. Panel chair and security consultant Peter Yapp warned that fewer than 10% of organizations have reviewed their suppliers’ security. “Attacks on the supply chain will only increase,” he said. Firms face a growing volume of attacks on their software vendors, and managed service providers. Criminal groups are following the lead of nation-state actors in using the…

Read More
1 2,918 2,919 2,920 2,921 2,922 4,095