SHOCKER: Senate Says Security Sucks—Still

A Senate committee graded cybersecurity as poor among eight big agency departments. Not much has changed since the last report.
The post SHOCKER: Senate Says Security Sucks—Still appeared first on Security Boulevard.
Continue reading SHOCKER: Senate Says Security Sucks—Still

When it Comes to SASE, Trust but Verify

The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise IT was long overdue. The fact is, … Continue reading When it Comes to SASE, Trust but Verify

When it Comes to SASE, Trust but Verify

The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise IT was long overdue. The fact is, … Continue reading When it Comes to SASE, Trust but Verify

Is Your VPN Tracking (and Leaking) User Activity?

The VPN industry touts all sorts of privacy protocols and encryption methods that purport to protect users. While this is, undoubtedly, important information, and is a decent way to compare and contrast different VPN services, it isn’t the full story … Continue reading Is Your VPN Tracking (and Leaking) User Activity?

How SASE Enables Zero-Trust

On this episode of The View With Vizard, Mike Vizard talks with Kelly Ahuja, CEO of Versa Networks about their latest $84 million funding round and the ways SASE enables zero-trust. The video is below followed by a transcript of the conversation. Anno… Continue reading How SASE Enables Zero-Trust

Developing Best Practices for API Security

APIs are pivotal to the overall success of a digital transformation. They allow developers to work across the digital assets and across multiple systems with ease. More organizations are adopting API initiatives, and are approaching digital transforma… Continue reading Developing Best Practices for API Security

Ransomware Attacks Leave Lasting Damage

Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects. A Keepe… Continue reading Ransomware Attacks Leave Lasting Damage

Storing Encrypted Photos in Google’s Cloud

New paper: “Encrypted Cloud Photo Storage Using Google Photos“:

Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo storage, which is especially useful for mobile devices. As users store more and more photos… Continue reading Storing Encrypted Photos in Google’s Cloud

Cybereason Offers Comprehensive Visibility and Protection for Diverse Systems

As enterprise technical infrastructures become more complex, managing them grows increasingly difficult. Protection against the growing problem of cybercrime also remains a key aspect for anyone involved in IT management. Cybersecurity considerat… Continue reading Cybereason Offers Comprehensive Visibility and Protection for Diverse Systems

Pushing the Limits of IDaaS with AMaaS

Concern over secure access to data has led to significant adoption of cloud identity management solutions, specifically identity-as-a-service (IDaaS), to ensure that people accessing applications are who they say they are–that is, to authenticate thei… Continue reading Pushing the Limits of IDaaS with AMaaS