Digital business transformation inverts network and security service design patterns, shifting the focal point to the identity of the user and/or device - not the data center. Security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift.
Read this Gartner...
Rapid growth of cloud-based secure web gateway services has become a disruptive force in the market. SWG vendors are adding cloud access security broker, remote browser isolation, firewall and other advanced features to enhance the security of their platforms.
Read this report for:
An evaluation of vendors in the...
Zero trust network access replaces traditional technologies, which require companies to extend excessive trust to employees and partners to connect and collaborate. Security and risk management leaders should plan pilot ZTNA projects for employee/partner-facing applications.
Read this report to learn:
Washington state was the initial epicenter of the COVID-19 outbreak in the U.S., and Cris Ewell was at the heart of the crisis as CISO of UW Medicine. He shares his insights and lessons learned from supporting caregivers and a remote workforce during the pandemic.
Just say goodbye to the remote access VPN.
Applications are now running in cloud and users are accessing them from everywhere. This means that organizations no longer control the network, making it impossible to do network security, and disrupting 25 years of remote access technology.
Transformation has created...
What are some of the critical considerations for aligning strong security controls with the workflow needs of clinicians? Omar Khawaja, CISO of Highmark Health, which includes health plans and a healthcare delivery system, discusses key issues.
New Exploits and Increased Relevance of Distributed Denial of Service (DDoS) Attacks
The number of DDoS attacks increased 180% in 2019. Are you prepared for 2020? Learn what you need to know from our Security Operations Center (SOC) in order to protect your organization before an attack happens.
Case study: Learn about several companies' experiences using Neustar UltraDDoS Protect
DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability.
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
Identity and access management for the workforce? Cybersecurity leaders are all over that. But what about customer IAM? There's plenty of room to grow there, judging by Dallas roundtable discussion featuring Richard Bird of Ping Identity and Gray Mitchell of IDMWORKS.
"Passwordless authentication" is one of the hot cybersecurity topics, but who's actually implemented it - and how? Jeff Carpenter of HID Global discusses the business benefits and the future of passwordless authentication.
The VPN has taken center stage to extend the security perimeter of the mobile workforce. But the VPN gateway opens several security issues including exposed risk of lateral movement and surface area of attack. To protect against this vulnerability, organizations have invested in costly and complex private applications...
When it comes to threat hunting, what are the complementary uses of SIEM and EDR technologies? What are the unique use cases for each, and how can they coexist? Sam Curry of Cybereason shares tips in advance of a virtual roundtable discussion.
Zoom, responding to research that highlighted encryption and infrastructure shortcomings in its audio and video conferencing software, has promised to further revamp its security controls. With COVID-19 driving a surge in working from home, researchers have been closely reviewing the security of such software.
With the COVID-19 pandemic forcing large portions of the workforce to shift to telework, CISOs need to rethink corporate policies on the use of video conferencing platforms and other communications tools, says NIST's Jeff Greene, who offers risk mitigation advice.