An executive perspective: The evolution of security and networking

Government and critical infrastructure organizations can no longer deliver services at scale and still defend against today’s cybersecurity threats without rethinking their approach to security. Ken Xie, cofounder and CEO of Fortinet, sits down with us to discuss what that approach must look like and which primary cababilities organizations must integrate into their operations to more effectively secure their enterprises.  CyberScoop: How have you seen the arc of cybersecurity evolving over the last decade to where enterprises and government agencies are today? Ken Xie: Today, data and applications move between different users, devices and networks, making visibility and control more difficult. The trusted zone has disappeared and the traditional perimeter extends through and with mobile end-user and IoT devices, even beyond the entire infrastructure. At the same time, digital innovation is continuously introducing new edges and fragmenting the perimeter even further. Of course, cloud adoption plays a critical role in […]

The post An executive perspective: The evolution of security and networking appeared first on CyberScoop.

Continue reading An executive perspective: The evolution of security and networking

Symantec shakeup creates fresh opening to shift security strategies

Steve McNamara is Regional Vice President Sales for VMware Carbon Black and a former vice president at Symantec. Information technology is always changing and so is the industry behind it. But recent developments surrounding the fate of one of the world’s most widely relied-upon suppliers of enterprise security products have created a significant “disturbance in the force.” In an odd twist on the perils of vendor lock-in, enterprise CIOs who rely on Symantec enterprise security products have found themselves in lock-out, following the decision late last year by Symantec’s new owner, Broadcom, to abandon support for all but 2,000 of Symantec’s most profitable enterprise security customers. Some reports since then suggest that number is closer to 700 accounts. When Broadcom completed its $10.7 billion acquisition of Symantec Enterprise Security in November of last year, it came with all the fanfare of one tech giant acquiring another in the name of […]

The post Symantec shakeup creates fresh opening to shift security strategies appeared first on CyberScoop.

Continue reading Symantec shakeup creates fresh opening to shift security strategies

Enabling secure remote work by embracing Zero Trust

Steve Faehl is Microsoft’s U.S. security chief technology officer, responsible for helping organizations develop strategies to reduce risk by improving their cyber defenses. One of the greatest challenges we often hear from public and private sector CIOs, when it comes to achieving a Zero Trust IT operating environment, is the question of how to tackle such a massive undertaking — and where and how to begin. If there was one lesson we learned at Microsoft as we sought to establish Zero Trust security principles internally — and we learned many lessons — it was the importance of starting with a fundamental premise: To build out assurances in places where we traditionally relied on implicit trust. That premise began at Microsoft with one of Bill Gates’ famous internal strategy memos  on “trustworthy computing.”  While the term Zero Trust hadn’t yet been coined, the concept and principles are essentially the same. They […]

The post Enabling secure remote work by embracing Zero Trust appeared first on CyberScoop.

Continue reading Enabling secure remote work by embracing Zero Trust

Adjusting to the new security realities of a remote workforce

CIOs and CISOs have been under intense pressure to meet the needs of homebound workers, while simultaneously needing to take added steps to safeguard their enterprise networks. Steve Grobman, senior vice president and chief technology officer at McAfee, has a global view of that challenge. Grobman leads the company’s worldwide development of next-generation cyberdefense and data science technologies as well as threat and vulnerability research. In an interview for CyberScoop, Grobman shares his observations on what enterprise IT leaders are encountering — and measures that they might take to mitigate risks associated with home networks essentially becoming part of the enterprise IT infrastructure. This interview, underwritten by McAfee, was edited for brevity. CyberScoop: Organizations are sprinting to equip their employees to work remotely. How is that impacting the cyber risks enterprises face across their networks? Steve Grobman: Organizations must recognize that there are risks associated with new types of employees […]

The post Adjusting to the new security realities of a remote workforce appeared first on CyberScoop.

Continue reading Adjusting to the new security realities of a remote workforce