Jamf plans to buy startup ZecOps to extend its ability to detect and respond to sophisticated threats across Mac, iOS and Android devices. Jamf's proposed acquisition will provide threat hunting tools to determine if any advanced attacks have compromised mobile devices.
The basic idea behind zero trust is the assumption that all devices and users are untrustworthy until proven otherwise.
Often associated with an identity-centric perimeter, zero trust network access (ZTNA) architecture helps organizations reduce their attack surface by eliminating network-layer risks, but is not...
The demand for anywhere, anytime
access has grown as the workforce has
become more distributed and cloud
traffic continues to soar.
How can IT leverage a simpler, more
scalable method to securely connect
users to the applications they need?
By bringing network and security
functions closer to users and...
How can a platform-led security approach improve employee and customer experiences? Mindtree CISO Chandan Pani describes how an integrated security approach helped him transform his organization from the pre-COVID-19 era to a hybrid, no-perimeter era that focuses on both security and productivity.
NortonLifeLock and Avast completed their $8.6 billion merger Monday, forming a $3.5 billion consumer cyber protection behemoth with expertise across security, privacy and identity. The fully merged company will have fewer than 4,000 employees and will initially go to market as NortonLifeLock.
InfoSec, IT risk and digital supply chain management professionals know the key to minimizing the risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPRSM) process.
Join this webinar where Dov Goldman discusses the increasing challenges surrounding...
As ransomware attacks grow, cyber insurance costs are skyrocketing, leaving small to midsized firms with tough decisions about insuring against threats, beefing up security and whether to pay or not pay ransom demands, says Diktesh Singh Puri, IT and cloud operations head at Reckitt Benckiser Group.
Anand Atre began his role as deputy CSO of Crux Informatics soon after the start of the COVID-19 pandemic, and he soon confronted the challenge of how to properly secure a hybrid workforce. He outlines his strategies for cybersecurity and employee education.
Ben Goodman, Okta's Asia-Pacific senior vice president and general manager, explains why critical infrastructure companies lag behind born-in-the-cloud companies in zero trust adoption. He expects traditional industries to adopt zero trust for some application services and then expand into others.
A new (ISC)² member pulse survey on remote work policies in 2022 found that cybersecurity professionals who get to choose where to work are the most satisfied, while those being forced back into the office are the least satisfied. The association advises firms to discuss options with employees.
With attack surface sprawl and growing numbers of vulnerabilities to address, security and IT teams are increasingly challenged to meet remediation targets. To overcome this problem, teams need an automated way of identifying and correlating the highest risk vulnerabilities with the right remediation steps.
Deploying a password management solution to select departments of your organization allows risks and vulnerabilities to persist, and even grow. Many applications are not compatible with SSO, and IT may not even be aware that their employees are using certain applications as Shadow IT increases. A password management...