2021 predictions for the Everywhere Enterprise

As we near 2021, it seems that the changes to our working life that came about in 2020 are set to remain. Businesses are transforming as companies continue to embrace remote working practices to adhere to government guidelines. What does the next year … Continue reading 2021 predictions for the Everywhere Enterprise

Most companies have high-risk vulnerabilities on their network perimeter

Positive Technologies performed instrumental scanning of the network perimeter of selected corporate information systems. A total of 3,514 hosts were scanned, including network devices, servers, and workstations. The results show the presence of high-r… Continue reading Most companies have high-risk vulnerabilities on their network perimeter

New Global Threat Landscape Report Reveals ‘Unprecedented’ Cyberattacks

Fortinet’s recently released Global Threat Landscape Report shows how the perimeter is extending to the home in the first half of 2020 – and what that means for cybercrime. Continue reading New Global Threat Landscape Report Reveals ‘Unprecedented’ Cyberattacks

Phishing Campaign Used SharePoint to Bypass Email Perimeter Tech

Security researchers spotted a phishing campaign that used SharePoint to bypass email gateway and other perimeter technologies. Cofense learned of the campaign after it analyzed an attack email sent from a compromised account @independentlegalassessors… Continue reading Phishing Campaign Used SharePoint to Bypass Email Perimeter Tech

Is your perimeter inventory leaving you exposed? Why it’s time to switch from IP to DNS

Historically, security teams and tools have used IP addresses to define their targets and scopes. But in a world where applications and networks are increasingly cloud-hosted or integrated with third-party services, IP addresses alone aren’t enough to … Continue reading Is your perimeter inventory leaving you exposed? Why it’s time to switch from IP to DNS

Be Suspicious: Living in a Post-Perimeter World

We must change the way we think about security as technology and the way people use it has changed – by Tim Brown, VP of Security, SolarWinds MSP
The post Be Suspicious: Living in a Post-Perimeter World appeared first on Security Boulevard.
Continue reading Be Suspicious: Living in a Post-Perimeter World

Is your organization getting physical security right?

For most organizations (and especially for tech companies), the physical security of data centers and headquarters is of the utmost importance. As Tim Roberts, a senior security consultant with NTT Security’s Threat Services group, duly points ou… Continue reading Is your organization getting physical security right?

Data guides the new security perimeter

A recent Kaspersky Lab report finds data breaches now cost enterprises more than $1.2 million. The report also finds that the success of digital transformation projects are being stalled by the fear of the impact and rising costs of breaches associated… Continue reading Data guides the new security perimeter

Self-service perimeter security for the hybrid cloud

Skyport Systems, a secure hyperconverged infrastructure provider for the hybrid enterprise, announced at the Black Hat USA 2017 conference the release of new self-service capabilities aimed at increasing the security and agility of hybrid cloud application deployments across the enterprise. These new capabilities for Skyport’s signature SkySecure system will reduce the growing burden on IT departments by providing users with a set of self-service application deployment, policy management, and troubleshooting tools. Applications built for SaaS … More Continue reading Self-service perimeter security for the hybrid cloud

Moving Beyond Network Security to a Data-Centric Approach

In my last post, I briefly summarized the evolution of network security. I will now discuss how network security strategies are no longer meeting the needs of organizations’ increasingly complex IT environments. A Different Strategy Technological innovation has changed the nature of the network itself. No longer are employees limited to their workstation or possibly […]… Read More

The post Moving Beyond Network Security to a Data-Centric Approach appeared first on The State of Security.

Continue reading Moving Beyond Network Security to a Data-Centric Approach