On one hand, rapid cloud migration has been a boon to financial services organization. But it's also exposed some security weaknesses. Mark Guntrip of Menlo Security days it's time to "defend differently," and the zero trust model is one critical element of that new approach.
While smart card standards remain prevalent throughout the federal government, the need to move beyond PIV and CAC for authentication has never been greater, especially with the proliferation of mobile devices.
Additionally, in Zero Trust environments that agencies are building, the diversity and number of...
While the concept of Zero Trust has been around for a while, and in many organizations Zero Trust initiatives are well underway, it still means different things to different people. There may be many roads to Zero Trust cutting across the network, identity, and access control, and the array of definitions or ways to...
While the U.S. government is making strides in improving the nation's cybersecurity, it needs to do more to protect critical infrastructure from attacks and create public-private partnerships to improve national security, the Cyberspace Solarium Commission notes in a report published Thursday.
In a letter sent to National Cyber Director Chris Inglis this week, a bipartisan group of lawmakers says clearer lines of demarcation are needed to better define the responsibilities of federal officials involved in cybersecurity.
The Office of Management and Budget is ordering federal agencies to begin identifying "critical software" that needs protection as part of the effort to fulfill President Biden's cybersecurity executive order. Executive branch agencies then will have a year to implement security measures.
On Tuesday, the Senate, by a vote of 69-30, passed a $1 trillion infrastructure spending bill that would provide additional money for cybersecurity over the next several years, including extra funds for the Department of Homeland Security and its Cybersecurity and Infrastructure Security Agency.
Nearly three weeks ago, Iran's state railway company was hit with a cyberattack that was disruptive and - somewhat unusually - also playful. Security firm SentinelOne says analyzing the wiper malware involved offers tantalizing clues about the attackers' skills, but no clear attribution.
It's been two years since Gartner first gave a name to Secure Access Service Edge. But it's quickly emerging as a popular architecture for digitally transformed enterprises. Elton Fontaine of Palo Alto Networks discusses SASE use cases for state and municipal government, as well as higher education.
In an eBook...
The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists. The visit comes as Israel faces growing pressure to see if NSO Group's spyware, called Pegasus, has been misused.
DataVisor recently conducted its latest Digital Fraud Trends study, and it uncovered some startling findings about the latest threats to the digital banking/payments landscape. CEO Yinglian Xie shares insights on how to improve fraud defenses with machine learning.
Calls are growing for an investigation into how commercial Pegasus spyware developed by Israel's NSO Group gets sold to autocratic governments and used to target journalists, lawyers, human rights advocates and others, with some lawmakers saying "the hacking-for-hire industry must be brought under control."