Navigating the path to passwordless authentication

Not all paths to passwordless authentication are equal, but adopting an integrated approach can better prepare enterprises for a passwordless future.

The post Navigating the path to passwordless authentication appeared first on CyberScoop.

Continue reading Navigating the path to passwordless authentication

Operational technology asset visibility fuels a capable cybersecurity program

New report offers insights into the vital role of asset visibility in protecting the entire operational technology environment.

The post Operational technology asset visibility fuels a capable cybersecurity program appeared first on CyberScoop.

Continue reading Operational technology asset visibility fuels a capable cybersecurity program

Planning a robust response to cyberthreats with a zero-trust mindset

New white paper outlines near-term tactics to energize government agencies’ cybersecurity efforts and zero trust implementation.

The post Planning a robust response to cyberthreats with a zero-trust mindset appeared first on CyberScoop.

Continue reading Planning a robust response to cyberthreats with a zero-trust mindset

White House joins industry leaders to double down on commitment to zero trust

U.S. National Cyber Director and top leaders from Google and Citibank promote public-private partnerships to increase critical cyber defenses at the recent Google Cloud Security Summit.

The post White House joins industry leaders to double down on commitment to zero trust appeared first on CyberScoop.

Continue reading White House joins industry leaders to double down on commitment to zero trust

New research identifies poor IAM policies as the greatest cloud vulnerability

Palo Alto Networks threat intelligence unit finds identity and access management policy flaws remain a principal cause of cloud security vulnerabilities.

The post New research identifies poor IAM policies as the greatest cloud vulnerability appeared first on CyberScoop.

Continue reading New research identifies poor IAM policies as the greatest cloud vulnerability

Combatting emerging-malware aimed at industrial control systems

New report offers insights on CHERNOVITE and the PIPEDREAM malware that threatens industrial control systems.

The post Combatting emerging-malware aimed at industrial control systems appeared first on CyberScoop.

Continue reading Combatting emerging-malware aimed at industrial control systems

Achieving web application security

Adopting web application security can help optimize workflow, drive efficiencies and meet agency missions.

The post Achieving web application security appeared first on CyberScoop.

Continue reading Achieving web application security