Businesses require better protection against malware and
DNS-based exfiltration. To identify the most significant
challenges to achieving a more secure enterprise, Ponemon
Institute - a renowned research center committed to privacy, data
protection, and information security policy - surveyed 604 IT and
Many companies that have adopted a layered security strategy
still fail to protect their Domain Name System (DNS)
infrastructure, a critical Internet protocol that was never
designed with security in mind.
Read this white paper to learn why integrating a DNS-based
solution with layered enterprise...
Assuming that every user, request, and server is untrusted until
proven otherwise, a zero trust solution dynamically and
continually assesses trust every time a user or device requests
access to a resource. But zero trust offers more than a line of
The model's security benefits deliver...
Hackers stole at least $920,000 from Russia's PIR Bank after they successfully compromised an outdated, unsupported Cisco router at a bank branch office and used it to tunnel into the bank's local network, reports incident response firm Group-IB.
Application Security is much different than other security domains, so applying the standard methods does not necessarily address the unique challenges that AppSec can bring.
Network security is everywhere so naturally, we understand the need for securing the perimeter. However, application vulnerabilities, which...
With the increase in vulnerabilities in operational technology infrastructure, it's important to deploy unidirectional hardware gateways to restrict entry into OT networks, says Ajit Jha of L&T Technology Services.
The explosion in the growth and diversity of devices linked to networks as a result of the internet of things and BYOD makes it more challenging to manage network security, says Wallace Sann of ForeScout.
At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has sinkholed the control domain for the router botnet, which should help contain the potential damage.
If operational technology systems need to get connected to IT systems, it's essential to have tight controls on the network, says Lam Kwok Yan, professor of computer science and engineering at Nanyang Technological University in Singapore.
The rapid rise of cloud and mobile has created increased complexities for IT including managing the security risks as well as end user expectation. The question is, how to take advantage of the agility the cloud affords you while securing your applications in the cloud from Internet threats and still give users easy,...
Legacy, perimeter-centric models of information security are of no use in today's digital businesses, according to a Forrester report sponsored by Akamai, as they are no longer bounded by the four walls of their corporation. Instead, CIOs must move toward a Zero Trust approach to security that is data- and...
In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.
Cybersecurity pros need to apply the Darwinian approach of "survival of the fittest" to cybersecurity to navigate the risk landscape and raise the industry baseline for security, says Dan Schiappa of Sophos.