Tag "Cyber Security Strategy"
As more people work from home, companies’ digital protections, data and financial information may be increasingly at risk as people toil outside their employers’ digital cocoons. Click here to view
The traditional network security model, in which traffic is routed through the data center for inspection and policy enforcement, is for all intents and purposes obsolete. A 2019 study by
Firefox and Chrome have recently begun supporting external DNS resolvers in the cloud. The use of these DNS services bypasses controls that enterprise IT organizations put in place to prevent
In this podcast recorded at RSA Conference 2020, we’re joined by the ThreatQuotient team talking about a threat-centric approach to security operations, the evolution of threat intelligence and the issues surrounding it. Click
Although I wasn’t exactly surprised by the alleged Saudi hack of Amazon CEO Jeff Bezos, it’s unusual that one of my annual New Year’s prognostications is so quickly proven accurate.
Time-based one-time passwords, or TOTPs, have become common as the second factor of two-factor authentication, which verifies users based on two conditions: something they know and something they have. Click
Even though many businesses invest in useful compliance training to help reduce the liability and legal risks they face, for some, integrating that training with their business strategy means overcoming
While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this challenge. Click here to
To build Cybersecurity into every product and system, C-suite members should gain a better understanding of the cyber-risks to which their organizations are exposed. Click here to view original webpage