SASE and Zero Trust: What’s the Connection?

Many organizations find themselves in a tricky spot today when it comes to digital transformation. With many looking to zero trust, how does Secure Access Secure Edge (SASE) fit in? On the one hand, the events of 2020 helped to speed up many digital adoption projects. A 2020 report from McKinsey found that more than […]

The post SASE and Zero Trust: What’s the Connection? appeared first on Security Intelligence.

Continue reading SASE and Zero Trust: What’s the Connection?

Zero Trust: What NIST’s Guidelines Mean for Your Resources

In May, The White House released an executive order on improving the nation’s cybersecurity. The order came with various directives for Federal Civilian Executive Branch agencies. Among other efforts, the order focused on the federal government’s advance toward zero trust architecture (ZTA). It framed this journey as one “which shall incorporate, as appropriate, the migration […]

The post Zero Trust: What NIST’s Guidelines Mean for Your Resources appeared first on Security Intelligence.

Continue reading Zero Trust: What NIST’s Guidelines Mean for Your Resources

2021 Cyber Resilient Organization Study: Rise of Ransomware Shows the Need for Zero Trust and XDR

“How many millions did you pay threat actors in a ransomware attack?” “Which investments most significantly improved cyber resiliency for your organization?” “Do you have a cybersecurity incident response plan that’s applied consistently across your enterprise?” The answers to these and other key questions produced several notable findings in the latest 2021 Cyber Resilient Organization […]

The post 2021 Cyber Resilient Organization Study: Rise of Ransomware Shows the Need for Zero Trust and XDR appeared first on Security Intelligence.

Continue reading 2021 Cyber Resilient Organization Study: Rise of Ransomware Shows the Need for Zero Trust and XDR

What Is Zero Trust? A Complete Guide for Security Professionals

Trust, for anyone or anything inside a secured network, should be hard to come by. The global shift to cloud environments has changed online security protocols. Therefore, strict verification (of everyone and everything) is now essential. The zero trust model isn’t overkill — it’s now a crucial tenet of network protection. The pandemic helped push […]

The post What Is Zero Trust? A Complete Guide for Security Professionals appeared first on Security Intelligence.

Continue reading What Is Zero Trust? A Complete Guide for Security Professionals

The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have

The more things change, the more they stay the same. Despite a changing threat landscape and threat actors who keep upping their game, the vulnerabilities behind the threats remain consistent. The OWASP Top 10, ranked by the Open Web Application Security Project, lists the 10 most prominent and dangerous risks and threats for applications. The […]

The post The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have appeared first on Security Intelligence.

Continue reading The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have

Improving Efficiency and Results in Threat Prevention with Morphisec Guard

Editor’s Note: This is a guest blog from IT Central Station.
Brian Wagner, the senior network engineer at Wilson County Schools in North Carolina, needed a threat prevention solution that would help improve his overall endpoint protection process … Continue reading Improving Efficiency and Results in Threat Prevention with Morphisec Guard

Securing M&A Activity Using Active Directory

Despite the market turmoil caused by the COVID-19 pandemic, 2020 proved that mergers and acquisitions (M&A) are an essential part of business. Even in a challenging year, M&A deals in Q3 2020 reached a total of $896.3 billion; a 32% increase f… Continue reading Securing M&A Activity Using Active Directory

Cybersecurity Lessons from the Pandemic: Prevention

Prevention lies somewhere between avoidance and protection, and preventative methods can belong to either. For example, what is stopping outsiders from entering your country or state or town in order to limit the spread of the novel coronavirus? Some m… Continue reading Cybersecurity Lessons from the Pandemic: Prevention