In defining an IAM strategy for the cloud, CISOs need to automate the processes of provisioning, de-provisioning, monitoring and auditing as well as implementing federated access and API integration, says Rushdhi Mohammad, information security officer at the Industrial Bank of Kuwait.
In the new EMA research report, Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation, the analyst Shamus McGillicuddy explores how network-based technology is the foundation of Zero Trust.
Shamus highlights that the Zero Trust model is a continuous cycle of establishing a...
Because many attacks against enterprises' cloud implementations are automated, a good defense involves using predictive technology that can analyze behaviors, says Brandon Tan of Forcepoint.
In 2020, the "zero trust" conversation evolved from "What is it?" to "How do we achieve a zero trust architecture?" Chase Cunningham, principal analyst serving security and risk professionals at Forrester, offers an outlook for what we can expect in 2021.
To enhance organizations' security postures in the year ahead, CISOs must strengthen authentication processes, increase the use of network segmentation tools and deploy effective threat intelligence capabilities, two CISOs recommend.
An investigation at the U.S. Treasury Department has found that it suffered a "significant" breach as a result of the SolarWinds Orion supply chain attack, a top Democrat on the Senate Finance Committee reports. Meanwhile President-elect Joe Biden said of the attack: "I promise you, there will be a response."
Implementing the "zero trust" model in a hybrid cloud environment presents challenges, says Rajpreet Kaur, senior principal analyst at Gartner, who recommends a phased approach.
Networks are fundamentally changing as a result of data being used across cloud environments. So security must be built into networks to improve mitigation of cyberthreats, says Nick Savvides, senior director of strategic business, APAC, at Forcepoint.
India's urban cooperative banks need to take a holistic approach to build a security governance structure, opt for an ASP services model and map their business-critical risks to comply with the RBI's security posture guidelines, according to a panel of experts.
C-suite executives in Bangladesh were surveyed to understand regional trends, key cybersecurity challenges and requirements. The survey aimed to explore current transformations in the cybersecurity landscape and critical challenges in the region. This survey, conducted online generated responses from Bangladesh...
Adopting a "security by design" approach and weaving it into the digital transformation road map helps organizations defend against cyberthreats, says Reem AlShammari, CISO at Kuwait Oil Co., who also advocates threat information sharing.
An IAM strategy for remote workforces should ensure that key stakeholders are aligned in listing key applications, infrastructure is mapped and risk- and role-based authentication for measuring user risk profiles are applied, says UAE-based Mustapha Huneyd, director of customer security at Ericsson.
Zero Trust began a decade ago from a realization that traditional perimeter-centric security models were failing. But how does identity fit into that? What are the design principles and properties a solution should have? In this talk we discuss how we got here, and what the maturity model for Identity in Zero Trust...
Working from home has gone quickly from luxury to necessity. Time to arm your teams for safe, secure, remote collaboration.
This e-book will guide you on how to keep your remote workforce humming efficiently. You need to provide them with a specific, comprehensive suite of remote work products, and you need to ensure...
Although most companies in the ASEAN (Association of Southeast Asian Nations) region don't have a defined Zero Trust strategy, the vast majority are already implementing solutions aligned to a Zero Trust posture.
By taking full advantage of the tools available, ASEAN security executives can seize the opportunity to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.