Getting data loss prevention right

When a CISO takes the wrong approach to data loss prevention (DLP), it can quickly compound into a triple loss. First, they lose their organization’s money by investing in an ineffective solution that meets required regulations but does little else. Se… Continue reading Getting data loss prevention right

Leveraging the full potential of zero trust

More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, according to Zscaler. Supporting the mass migration to zero trust to secure users a… Continue reading Leveraging the full potential of zero trust

Beyond Identity and Zscaler join forces to strengthen zero trust security strategies

Beyond Identity and Zscaler joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling secure access to applications. As threat actors’ attacks increase in scope, usin… Continue reading Beyond Identity and Zscaler join forces to strengthen zero trust security strategies

Will cyber saber-rattling drive us to destruction?

As cyberattacks have grown increasingly destructive, nations are entertaining the idea of responding to them with conventional military forces. It is difficult to determine how serious countries are when they threaten “kinetic” responses to digital att… Continue reading Will cyber saber-rattling drive us to destruction?

Zscaler unveils data protection innovations to help organizations mitigate security risks

Zscaler announced new data protection innovations that build upon a rich heritage of securing data across all cloud apps for data in motion, data at rest, and BYOD assets with accuracy and scale. The new advancements accelerate data protection programs… Continue reading Zscaler unveils data protection innovations to help organizations mitigate security risks

65% of companies are considering adopting VPN alternatives

Despite high awareness of VPN risks, remote work forced many companies to rely more heavily on legacy access methods during the pandemic. At the same time, cybercriminals continue to take advantage of long-standing security vulnerabilities and increase… Continue reading 65% of companies are considering adopting VPN alternatives

Open Cybersecurity Schema Framework project helps organizations detect and defend from cyberattacks

A coalition of cybersecurity and technology leaders announced an open-source effort to break down data silos that impede security teams. The Open Cybersecurity Schema Framework (OCSF) project, revealed at Black Hat USA 2022, will help organizations det… Continue reading Open Cybersecurity Schema Framework project helps organizations detect and defend from cyberattacks

Phishers use custom phishing kit to hijack MFA-protected enterprise Microsoft accounts

An ongoing, large-scale phishing campaign is targeting owners of business email accounts at companies in the FinTech, Lending, Insurance, Energy and Manufacturing sectors in the US, UK, New Zealand and Australia, Zscaler researchers are warning. The at… Continue reading Phishers use custom phishing kit to hijack MFA-protected enterprise Microsoft accounts