Zscaler CISO on balancing security and user convenience in hybrid work environments

In this Help Net Security interview, Sean Cordero, CISO at Zscaler, talks about securing hybrid work and the new challenges it presents to cybersecurity teams. He discusses how hybrid work has exposed gaps in traditional security models while offering … Continue reading Zscaler CISO on balancing security and user convenience in hybrid work environments

Implement continuous authentication of users within an internal network using FreeRADIUS in pfsense

I am building a small network virtualization using VirtualBox, with the goal of testing and implementing various security concepts. The network includes a pfSense VM acting as the router, three Ubuntu Desktop users, and two Ubuntu Server &… Continue reading Implement continuous authentication of users within an internal network using FreeRADIUS in pfsense

Implement continuous authentication of users within an internal network using FreeRADIUS in pfsense

I am building a small network virtualization using VirtualBox, with the goal of testing and implementing various security concepts. The network includes a pfSense VM acting as the router, three Ubuntu Desktop users, and two Ubuntu Server &… Continue reading Implement continuous authentication of users within an internal network using FreeRADIUS in pfsense

The changing face of identity security

It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold of privileg… Continue reading The changing face of identity security

Maximizing security visibility on a budget

In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud and hybrid environments. He explains why asset intelligence—going beyond bas… Continue reading Maximizing security visibility on a budget

Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead

The interim Federal Chief Information Security Officer spelled out some 2025 agenda items for feds at CyberTalks.

The post Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead appeared first on CyberScoop.

Continue reading Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead

Agencies face ‘inflection point’ ahead of looming zero-trust deadline, CISA official says

Shelly Hartsook said she’s seen promising data on implementation of security protocols ahead of next week’s due date for agencies to submit updated plans.

The post Agencies face ‘inflection point’ ahead of looming zero-trust deadline, CISA official says appeared first on CyberScoop.

Continue reading Agencies face ‘inflection point’ ahead of looming zero-trust deadline, CISA official says

3 easy microsegmentation projects

Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific databases but … Continue reading 3 easy microsegmentation projects