Is VPN or Zero Trust Best for Remote Working Security?

For the past few decades, a corporate virtual private network (VPN) was the go-to answer for connecting to work when away from the office. It was simple, affordable and relatively secure. But debate has been brewing for several years regarding whether or not the corporate VPN security is dead — or at least not the […]

The post Is VPN or Zero Trust Best for Remote Working Security? appeared first on Security Intelligence.

Continue reading Is VPN or Zero Trust Best for Remote Working Security?

Adopting Microsegmentation Into Your Zero Trust Model, Part 1

The idea to discuss microsegmentation and zero trust came to me while reading cybersecurity articles over cellular data as I was waiting in line one day. And, I wrote this article on different devices: on my laptop connected to my home wireless network; on my tablet over Wi-Fi. Each time I switched devices or wireless […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 1 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 1

Don’t Forget: A Checklist for Offboarding Remote Employees Securely

We all know about the threat of threat actors trying to access our corporate data.  But with the rise of remote work, keeping an eye on employees during offboarding is an important area to watch, as well. In many cases, employees can still access sensitive data well after they leave the job. This is even […]

The post Don’t Forget: A Checklist for Offboarding Remote Employees Securely appeared first on Security Intelligence.

Continue reading Don’t Forget: A Checklist for Offboarding Remote Employees Securely

3 Vulnerabilities to Plug to Secure Your Customers’ Remote Workforce

The migration to a remote workforce hit fast forward in the past year as businesses around the world asked employeesRead More
The post 3 Vulnerabilities to Plug to Secure Your Customers’ Remote Workforce appeared first on Kaseya.
The post 3 Vulnerabil… Continue reading 3 Vulnerabilities to Plug to Secure Your Customers’ Remote Workforce

Hybrid Work: Benefits, Disadvantages and Other Considerations

The year 2020 was a tumultuous year to say the least. With livelihoods around the world upended by the COVID-19Read More
The post Hybrid Work: Benefits, Disadvantages and Other Considerations appeared first on Kaseya.
The post Hybrid Work: Benefits, D… Continue reading Hybrid Work: Benefits, Disadvantages and Other Considerations

The Future Impact of Remote Work on IAM

Remote work is evolving. Organizations must future-proof their IAM strategies to maintain remote work and ensure that their employees can securely connect to company applications and networks.
The post The Future Impact of Remote Work on IAM appeared f… Continue reading The Future Impact of Remote Work on IAM

Remote Work Trends: How Cloud Computing Security Changed

Looking back on 2020, we can honestly say it was a year like no other. We faced wildfires, hurricanes, a raucous election season and, of course, a pandemic that forced millions of people to work, socialize and attend school from home. For cybersecurity teams, 2020 presented a unique challenge. How do you continue to offer […]

The post Remote Work Trends: How Cloud Computing Security Changed appeared first on Security Intelligence.

Continue reading Remote Work Trends: How Cloud Computing Security Changed

Why Your Business Should Consider Modern IAM Strategies Now

The coronavirus pandemic will permanently change how and where we work. Businesses need to think through these changes today and invest in IAM strategies for the long-run.
The post Why Your Business Should Consider Modern IAM Strategies Now appeared fi… Continue reading Why Your Business Should Consider Modern IAM Strategies Now

Cybersecurity Predictions for 2021

Security, risk and anti-fraud experts from across RSA predict the emerging cybersecurity trends and challenges for 2021.
The post Cybersecurity Predictions for 2021 appeared first on Security Boulevard.
Continue reading Cybersecurity Predictions for 2021