Tag "Zero Trust"

Back to homepage
Software

Zero trust browsing: Protect your organization from its own users

To the casual observer, the cyberattack landscape is constantly shifting. In recent years, the threats and scams have evolved from Nigerian princes to stranded travelers, pop-ups warning of outdated software

Software

6 Best Practices For Increasing Security In AWS In A Zero Trust World

Enterprises are rapidly accelerating the pace at which they’re moving workloads to Amazon Web Services (AWS) for greater cost, scale and speed advantages. And while AWS leads all others as

Software

The (Re-)Emergence of Zero Trust

As we enter 2019, we’re still facing massive cyber-attacks that expose the sensitive data of millions of people and impact businesses both from a reputational and material perspective. To address

IT Compliance

IT Security Predictions For 2019

Making predictions in the information security space is always an interesting yet challenging task. The very nature of cybersecurity, with the velocity of vulnerabilities and new threat actor coalitions along

Software

Prepare for the new royal wedding of IT: AI and cyber security

Phishing, cyber bots, multi-cloud strategies, zero trust, diversity in cyber and blockchain and cyber: we are set to enter a tumultuous period for cyber crime: but AI and cyber security

Identity Theft

A New Year’s Resolution: Security is Broken…Let’s Fix It

As we near the end of 2018, another wave of massive cyber-attacks has exposed personally identifiable information belonging to hundreds of millions of people and will cost the impacted businesses

Software

The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust

These and many other fascinating findings are from Wipro’s State of Cybersecurity Report 2018. A copy of the report can be downloaded here (PDF, 96 pp., no opt-in). The study is based on

Software

“Zero Trust” Is the Opposite of Business

The term zero trust has been cropping up a lot recently, with even a small conference on the topic recently. It sounds like an ideal security goal, but some caution is warranted.

Identity Theft

Identities Are The New Security Perimeter

There’s been a 135% year-over-year increase in financial data for sale on the Dark Web between the first half of 2017 and the first half of 2018. The Dark Web is now

Mobile

T-Mobile Data Breach

T-Mobile has experienced another data breach, as reported by TechCrunch.  Hackers stole customer stole names, billing zip codes, phone numbers, email addresses, account numbers, and account type in what the company