Six Key Characteristics of a Modern Secure Web Gateway

As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A recent… Continue reading Six Key Characteristics of a Modern Secure Web Gateway

Bitglass Secure Access Service Edge (SASE) Overview

With 2020 in the rear view mirror, we’re excited to start the New Year with new content and tons of exciting news. We’re kicking off 2021 with our new video which briefly highlights Bitglass’ Total Cloud Security Platform. Our secure access service edg… Continue reading Bitglass Secure Access Service Edge (SASE) Overview

Trends in IT-Security and IAM in 2021, the “New Normal” and beyond

Article by Dennis Okpara, Chief Security Architect & DPO at IDEE GmbH

Yes, there is hope for 2021, but the challenges of the “New Normal” are here to stay. CISOs have to prepare and start acting now, because cybersecurity and the IT-infrastructure… Continue reading Trends in IT-Security and IAM in 2021, the “New Normal” and beyond

SaaS security in 2021

The migration toward subscription-based services via the SaaS business model isn’t new this year — it’s part of a larger shift away from on-premises datacenters, applications, etc., that has been underway for years. The pandemic accelerated the shift, … Continue reading SaaS security in 2021

Shadow IT Adds to Remote Work Security Risks

The pandemic and resulting remote work have revived concerns surrounding shadow IT Two of the biggest challenges for IT departments and digital transformation in 2020 were the move to remote work and cybersecurity. IT, security and leadership teams ha… Continue reading Shadow IT Adds to Remote Work Security Risks

Shadow IT: Addressing the Risks in Remote Work Environments

Shadow IT can cause big problems for cybersecurity. The trouble is in the name: these connections exist in the shadows outside of IT (information technology) and security personnel’s knowledge. So, what can IT leaders do to address it in a time of growing remote workforces? What is Shadow IT? Shadow IT consists of information technology […]

The post Shadow IT: Addressing the Risks in Remote Work Environments appeared first on Security Intelligence.

Continue reading Shadow IT: Addressing the Risks in Remote Work Environments

78% of Microsoft 365 admins don’t activate MFA

On average, 50% of users at enterprises running Microsoft 365 are not managed by default security policies within the platform, according to CoreView. Microsoft 365 administrators fail to implement basic security like MFA The survey research shows that… Continue reading 78% of Microsoft 365 admins don’t activate MFA

Preventing Shadow IT from Blindsiding your Zero Trust Plan

I’ve spoken before about Zero Trust approaches to security, but for many of those starting on their journey, there isn’t an obvious place to start with the model. With this post, I wanted to share an example approach I’ve seen working that many organis… Continue reading Preventing Shadow IT from Blindsiding your Zero Trust Plan