Unmanaged third-party access threatens OT environments

Many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to operational technology (OT) systems, according to Cyolo. Ensuring secure access to OT environments is a… Continue reading Unmanaged third-party access threatens OT environments

Cyolo unveils partner program to accelerate adoption of zero-trust access

Cyolo introduced partner program designed to help organizations enhance their cybersecurity capabilities for protecting sensitive systems and applications. The newly redesigned program will provide partners with a high profit margin through a simplifie… Continue reading Cyolo unveils partner program to accelerate adoption of zero-trust access

There is no secure critical infrastructure without identity-based access

Organizational security strategy has long been defined by an internal perimeter enclosing all a company’s information in a single secure location. Designed to keep external threats out through firewalls and other intrusion prevention systems, this secu… Continue reading There is no secure critical infrastructure without identity-based access

Photos: RSA Conference 2022 Early Stage Expo

RSA Conference 2022 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. The Early Stage Expo is an innovation space dedicated to promoting up-and-comers in the industry. The fe… Continue reading Photos: RSA Conference 2022 Early Stage Expo

The future of security protocols for remote work

Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a real focus on establishing solid security protocols and building a strong rel… Continue reading The future of security protocols for remote work