Organisations are struggling to monitor remote employees – IT Governance UK Blog

Organisations are struggling to monitor remote employees – IT Governance UK Blog

I don’t think any of us would have thought in March 2020 that remote working would be as popular as it has become. The scepticism perhaps came from the hurriedness with which the measures were implemented, as many people worked from kitchen tables and between childcare responsibilities. Or maybe it stemmed from organisations’ historic reluctance to adopt remote working. Their reason for that is understandable: remote working makes it almost impossible to keep an eye…

Read More

Product spotlight on sports, stadiums and venue security

Product spotlight on sports, stadiums and venue security

Product spotlight on sports, stadiums and venue security | 2021-05-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Who owns AD security in your organization?

Who owns AD security in your organization?

Who owns AD security in your organization? | 2021-05-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Hardware security breaches are virtually guaranteed

Hardware security breaches are virtually guaranteed

Hardware security breaches are virtually guaranteed | 2021-05-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Mind The GAAP: Understanding the Importance of the CIS Controls

Mind The GAAP: Understanding the Importance of the CIS Controls

Given that attacks are only increasing and there needs to be greater efficacy in how companies protect themselves, let us reference how the financial industry has created and relies on a body of standards to address issues in financial accounting as a defined comparison for Information Security. To support this argument, there is a defined contrast between information security and Generally Accepted Accounting Principles. We’ll explore this relationship in more detail below. First, we’ll provide…

Read More

When it comes to your zero trust strategy, a modern approach to IGA is key

When it comes to your zero trust strategy, a modern approach to IGA is key

By Rod Simmons, vice president of product strategy, Omada The traditional perimeter approach to security was being dramatically altered long before COVID-19. However, the massive shift to a largely remote workforce ushered in as a result of the pandemic accelerated the need for a new approach. Securing access to a range of on-premises and cloud-based applications requires a transformation of identity and access management initiatives. The misguided trust we once had for users inside the…

Read More

Pipeline Security Tunnel Vision

Pipeline Security Tunnel Vision

Few security topics have elicited as much mythology as pipeline security incidents. Perhaps it is the nature of the esoteric equipment involved, the stories of explosions in the tundra, international intrigue, or just the fact that the scale of what could happen, and its impact, is so broad. I happen to live along the path between the Permian Basin (the US’s largest petroleum reserves) and the Gulf Coast refinery belt and am sensitized to pipeline…

Read More

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

Almost all Wi-Fi is potentially vulnerable to flaws that date back to 1997 when it became commercially available, but even the person who discovered the weaknesses says some of them are difficult to exploit. Mathy Vanhoef, a post-doctoral student at NYU Abu Dhabi, has created attacks—FragAttacks—that take advantage of the vulnerabilities, but in an academic paper about them, says the most widespread vulnerabilities can be exploited only under specific, rare conditions, and require either user…

Read More

Palo Alto Networks Appoints Aparna Bawa to Its Board of Directors

Palo Alto Networks Appoints Aparna Bawa to Its Board of Directors

SANTA CLARA, Calif., May 14, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the appointment of Aparna Bawa to the company’s board of directors. “Aparna is a proven leader who has helped technology companies rapidly scale, and I’m pleased to welcome her to our board,” said Nikesh Arora, chairman and CEO of Palo Alto Networks. “She embodies our commitment to an experienced, creative and diverse leadership team. Along with other…

Read More

Forrester Recognizes Cisco Secure Endpoint Advancements – Promotes to Strong Performer – Cisco Blogs

Forrester Recognizes Cisco Secure Endpoint Advancements – Promotes to Strong Performer – Cisco Blogs

Secure Endpoint offers more as shown in new Forrester Wave report At the publishing of the previous Q3 2019 Forrester Wave report for Endpoint Security Suites, Secure Endpoint was lauded as one of the least obtrusive security products to end-user productivity. Now, per Forrester’s Q2 2021 report, Cisco has increased its market presence to the next level and has moved upward from a Contender to a Strong Performer, well poised to break into the nearby…

Read More
1 3,454 3,455 3,456 3,457 3,458 3,915