Traditionally, CISOs initiate discussions about enterprise browsers due to their understanding of cybersecurity challenges in consumer browsers. But the involvement of CIOs is crucial as they oversee changes affecting end-user experience, according to Mike Fey, co-founder and CEO, Island.
Ivanti issued an urgent alert to users of its endpoint security product to patch a critical vulnerability that exposes systems to potential exploitation by unauthorized attackers. The SQL injection vulnerability tracked as CVE-2023-39336 is in all supported versions of Ivanti Endpoint Manager.
Year after year, the rise in large-scale data breaches is faster and steeper. Not only is your business at risk, but so are your customers – as we keep learning, the hard way.
As we adjusted to the pandemic, cybersecurity trended – quite unfortunately – in the wrong direction. While our work lives merged with...
A hacking campaign that exploited Ivanti mobile device manager to target the Norwegian government began in April or possibly earlier, say cybersecurity agencies from the U.S. and Norway. Mobile device management systems are "attractive targets for threat actors," the alert warns.
For the first time in 17 years, day-to-day control at converged endpoint management provider Tanium rests outside the Hindawi family. The Seattle-area firm named former Tibco, BMC Software and Salesforce executive Dan Streetman as CEO to evolve Tanium's client-facing operations and partner strategy.
Cybereason has gone all-in on helping customers mitigate threats beyond the endpoint to minimize the impact of ongoing SOC staffing challenges, CEO Lior Div says. The company's focus on tracking and following malicious operations sets Cybereason's approach to XDR apart from rivals.
Remote access VPN has been an enterprise network staple for years. However, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. Network and security teams are asking about how to secure access to all applications—not just those in the data center.
...
Learn how to ensure zero trust access to private applications in datacenters, Azure and multi-cloud environments. Leverage your Azure AD user store for Single Sign On (SSO) into any private resource, beyond just SAML-based web SSO.
When it comes to keeping your private apps private, on-prem VPNs lack the agility...
Lack of visibility is the single biggest challenge facing security teams today, and this latest report from Sevco identified a significant gap in the IT assets missing basic security tool protections.
It also uncovers the more insidious threat of “stale” IT assets that act as ticking timebombs for...
The era of pandemic-induced telework is also the era of higher reliance on mobile devices for sensitive workplace information - meaning we're likewise living in the age of fretful chief information security officers, a new survey concludes. "Companies are still struggling" to secure mobile devices.
This year's winner of RSA Conference's prestigious Innovation Sandbox Contest has completed its first major funding round, earning backing from CrowdStrike CEO George Kurtz. Talon has received $100 million to support more operating systems, add more capabilities and boost existing integrations.
While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.
The cloud. SaaS. Mobile workforces. An unstoppable wave of BYOD. Today, users and the applications they depend on are more widely distributed than ever. Networks are exposed and threats continue to evolve. But “lock it down” no longer works. IT Security teams need to achieve the same visibility and control they...
Many enterprise security practices were incorporated into the 5G standard, however the deployment rollout and status of 5G is continually evolving. Additionally, network slicing, a 5G service offering, has the potential to become a security tool for enterprises to leverage in addition to its role of delivering...
Ransomware-as-a-service, supply chain attacks and the Russia/Ukraine war - they all are factors behind the growing need for digital executive protection outside the traditional workplace. Chris Pierson of BlackCloak shares new research and insights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.