Please turn on your JavaScript for this page to function normally.
medical devices
Connected medical devices brought security loopholes mainstream

The increasing demand for self-health management, coupled with the digitalization of the modern healthcare ecosystem, translates into a medical connected devices market that …

zero
Push past zero trust barriers to securely connect the distributed workforce

If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is …

find
Security research project: The easiest way to get “experience” and land a job in cybersecurity

Despite what you might have heard, there’s no shortage of people looking for jobs in cybersecurity. Every open position triggers stacks of resumes, but the challenge is …

SASE
Transitioning to a SASE architecture

There are several key points when contemplating a change in your security architecture. First, and foremost, there is still a security perimeter. The perimeter, however, is …

Pulse Secure
Critical infrastructure implications of the Pulse Secure multi-factor authentication bypass

The FireEye Mandiant team has discovered multiple threat actors exploiting a zero-day vulnerability in Pulse Secure VPN appliances. The attack infrastructure is very …

lock
How micro-segmentation creates an uphill battle for intruders

The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …

zero
Approaching zero trust security strategically

With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

lock
Digital business requires a security-first mindset

Security is an undeniable necessity for the survival and success of any company. COVID-19 accelerated digital transformation initiatives across all industries and this shift …

glasses
Protecting the human attack surface from the next ransomware attack

As we head into 2021, ransomware is making another resurgence, particularly in targeted attacks from highly organized hacker groups. In fact, cybercrime is surging since the …

Mask
The parallels of pandemic response and IoT security

While adjusting to life under a pandemic, we’ve become familiar with a host of medical and safety terminology that either didn’t exist before or was of little interest to …

brain
Machine learning-powered cybersecurity depends on good data and experience

According to IDG’s 2020 Cloud Computing Study, 92% of organizations have at least some sort of cloud footprint in regard to their IT environment. Therefore, traditional cloud …

identity
The future of touchless visitor management lies with biometrics

With so many people making their way into an office building on any given day – whether as a prospective job candidate, a vendor with a delivery, or for a client meeting …

Don't miss

Cybersecurity news