Most challenging security threats for CTOs

59% of CTOs still see human error as the main security threat to their business, alongside other prominent concerns such as ransomware (49%) and phishing (36%), a research from STX Next reveals. Despite this recognition of risk, the findings suggest th… Continue reading Most challenging security threats for CTOs

IoT Security: Are Personal Devices Dragging Your Work Network Down?

How many connected devices have you added to your household since March 2020? Be sure to count fitness trackers, speakers, gaming machines and even your Tesla, if there’s one in your driveway. Were you one of the many people who waited months for a Peloton? Don’t overlook your new bike. Now add in all your […]

The post IoT Security: Are Personal Devices Dragging Your Work Network Down? appeared first on Security Intelligence.

Continue reading IoT Security: Are Personal Devices Dragging Your Work Network Down?

Does a solution exist to permit account sharing without revealing the account password?

I’m looking for a process to replace the status quo of notepad and Excel. We’ve tested a market-leading password manager. An issue that comes up with this is that the secure sharing password facility has some significant vulnerabilities. W… Continue reading Does a solution exist to permit account sharing without revealing the account password?

Fragmented approach to identity security management creates risk

One Identity released global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity sprawl – has been driven by surges in user identities (internal, third parties, and customers… Continue reading Fragmented approach to identity security management creates risk

Analyzing and implementing a national zero trust architecture

This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. government has a unique interest in cyber awareness. The theme of the first week imp… Continue reading Analyzing and implementing a national zero trust architecture

What is Web Application Security? A Protective Primer for Security Professionals

Evolving threats put applications at risk. Robust web application security can help prevent compromise before it happens. Not sure where to start? Our protective primer has you covered. What Is Web Application Security?  Web application security focuses on the reduction of threats through the identification, analysis and remediation of potential weaknesses or vulnerabilities. While the bulk […]

The post What is Web Application Security? A Protective Primer for Security Professionals appeared first on Security Intelligence.

Continue reading What is Web Application Security? A Protective Primer for Security Professionals

3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage

With COVID-19 variants on the rise, widespread remote work may be sticking around longer than IT leaders would like, which comes with a heightened risk for cyberattacks that could expose customer data, steal company information, or take control of inte… Continue reading 3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage

Out with the old, in with the new: From VPNs to ZTNA

The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and individuals across the globe, but now the tide is turning. As technology advance… Continue reading Out with the old, in with the new: From VPNs to ZTNA

Previous employees with access to corporate data remain a threat to businesses

Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to corporate data. This is according to A research by My1Login, which found few … Continue reading Previous employees with access to corporate data remain a threat to businesses

Zero trust network access: A safe journey to a better employee experience

Trust is a foundational element of society. When engaging in any social or commercial interaction, we need to be able to trust the people we deal with. And yet, one of today’s most intensely discussed IT security concepts is zero trust network ar… Continue reading Zero trust network access: A safe journey to a better employee experience