Can Zero Trust Solutions Protect Hybrid, Multi-Cloud Networks?

As enterprises leverage hybrid IT, multiple clouds and other services, the Zero Trust philosophy is starting to come up short, hampered by challenges such as network orchestration across multiple clouds and a lack of support by some cloud vendors for … Continue reading Can Zero Trust Solutions Protect Hybrid, Multi-Cloud Networks?

Gartner: SASE Poised to Transform Cybersecurity

Research firm Gartner is lending credence to a promising technology called secure access service edge (SASE). SASE is an emerging, disruptive technology that strives to create a secure cloud environment that is fully integrated into the network. Gartn… Continue reading Gartner: SASE Poised to Transform Cybersecurity

Will VPNs Continue Losing the Battle to Keep Data Secure? 

Virtual private networks (VPNs) are under attack and hackers may be winning the battle, using exploits that are becoming all-too-common. While many may argue that VPNs are salvageable and can be returned to their once-lofty status of protecting data, … Continue reading Will VPNs Continue Losing the Battle to Keep Data Secure? 

Cybersecurity Skills a Top Training Goal

Cybersecurity training is evolving to better meet the real-world needs of today’s threat landscape IT training and certification are evolving rapidly into something that actually offers significant value to both companies and their IT staffers. … Continue reading Cybersecurity Skills a Top Training Goal

Are Cyber-Ontologies the Future of Cybersecurity?

The science of cybersecurity is starting to permeate the discussions of thought leaders in the cyber realm. After all, attacks based on APTs (advanced persistent threats), phishing and ransomware are on a growth trajectory, and seem to be getting more… Continue reading Are Cyber-Ontologies the Future of Cybersecurity?

Surveys Show Enterprises Slow to Adopt Zero Trust

The Zero Trust approach to cybersecurity is beginning to make inroads in IT departments of all shapes and sizes. Nevertheless, a recent survey shows that while cybersecurity professionals are aware of the growing risks posed by technological change, i… Continue reading Surveys Show Enterprises Slow to Adopt Zero Trust

Bringing Real-Time Data Discovery to the Cybersecurity Puzzle

One solution is helping organizations keep data private at rest and in motion, easing the data discovery process and helping organizations meet compliance regulations While protecting consumer privacy has always been a concern for enterprises, recent … Continue reading Bringing Real-Time Data Discovery to the Cybersecurity Puzzle

HyTrust CloudControl 6.0 Unifies Security for Multi-Cloud Environments

Cybersecurity is becoming a critical concern for organizations adopting multi-cloud environments. That concern is further growing in magnitude thanks to widespread adoption of containers being used to power the next generation of hybrid cloud solution… Continue reading HyTrust CloudControl 6.0 Unifies Security for Multi-Cloud Environments

Moxa Industrial Switch Vulnerabilities Expose Major Industries to Compromises

Major industrial networks, such as those in the oil and gas, transportation and maritime logistics sectors, may be vulnerable to network compromises due to recently discovered security flaws in Moxa industrial switches. The vulnerabilities were discov… Continue reading Moxa Industrial Switch Vulnerabilities Expose Major Industries to Compromises

DigiCert Purchases QuoVadis, Becomes a Qualified TSP

Utah-based DigiCert acquired Swiss company QuoVadis in January, with the intention of delivering Qualified digital certificates and e-signature platforms certified for ETSI standards.  QuoVadis is a qualified trust service provider (TSP) in the EU, a … Continue reading DigiCert Purchases QuoVadis, Becomes a Qualified TSP