To protect manufacturing operations and data, there are some important cybersecurity gaps to address. Cybersecurity company Lookout explains how to close the five most common security gaps in manufacturing, which are created as a result of digital transformation.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the evolution of fraud trends and the challenges in implementing the "zero trust" framework in the OT environment.
On one hand, rapid cloud migration has been a boon to financial services organization. But it's also exposed some security weaknesses. Mark Guntrip of Menlo Security days it's time to "defend differently," and the zero trust model is one critical element of that new approach.
The Executive Order on Improving the Nation’s Cybersecurity issued on May 12, 2021 requires federal agencies to develop a plan to adopt Zero Trust architectures within 60 days and multi-factor authentication within 180 days. With the increasing cyber attacks toward all areas of government, the executive order should...
Digital transformation has rapidly accelerated over the last year, with organizations requiring greater agility and focusing
even more on the shift to cloud. At the same time, the workforce has shifted from mobile to fully remote, with more
location flexibility anticipated to be a lasting impact of the pandemic....
While smart card standards remain prevalent throughout the federal government, the need to move beyond PIV and CAC for authentication has never been greater, especially with the proliferation of mobile devices.
Additionally, in Zero Trust environments that agencies are building, the diversity and number of...
While the concept of Zero Trust has been around for a while, and in many organizations Zero Trust initiatives are well underway, it still means different things to different people. There may be many roads to Zero Trust cutting across the network, identity, and access control, and the array of definitions or ways to...
Security leaders face numerous challenges, including software vulnerabilities, third-party supplier liabilities, and distracted employees who may not realize their security behaviors are putting the company at risk. While many organizations focus on mitigating external threats, 30% of data breaches actually involve...
The lines between internal “trusted” entities and external “untrusted” entities have blurred, and do not align with the idea of a single, defensible boundary between internal assets and the outside world. A modern security strategy that incorporates Zero Trust enables you to meet evolving security challenges...
Digital transformation has rapidly accelerated over the last year, with organizations requiring greater agility and focusing even more on the shift to cloud. At the same time, the workforce has shifted from mobile to fully remote, with more location flexibility anticipated to be a lasting impact of the pandemic. These...
Few industries have changed as dramatically as financial services (fiserv) in the last decade. Banking and financial transactions were
once an exclusively in-person process; now customers regularly conduct their financial affairs digitally, and employees of fiserv
companies increasingly rely on websites and cloud...
Join Industry leaders from Hitachi in an coffee time talk as they discuss and share insight into how an enhanced Identity Governance approach to Zero Trust can help secure your infrastructure and provide a greater degree of resilience to cyber attacks and ransomware.
View this session today to learn:
Why a ZT...
In the latest weekly update, three editors at Information Security Media Group discuss important cybersecurity issues, including the latest ransomware trends, plus an update on NIST's "zero trust" initiative.
The zero trust conversation has matured in the past year, but some nuances are still being overlooked in terms of strategic vision. Christopher Hines of Zscaler weighs in on how the model can be applied toward so much more than merely VPN replacement.
In this eBook, Hines discusses how zero trust can be used...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.