How Edge Computing Will Drive New Demands for Data Security, Infrastructure Integrity and New IT Policies

With the explosive growth of Internet of Things (IoT) devices and the related massive data produced at the edge of the network, the centralized cloud computing model is running up against limitations associated with bandwidth, computing resources, and the latency often associated when processing is done in the cloud instead of locally. Innovation and the […]

Read More

The Increasing Attack Surface in 2019

The “attack surface” is simply the total digital resources that are exposed to threats across the enterprise, and that attack surface is growing faster than ever before. In 2018, we saw a new level of criminal creativity in the way of adversarial AI algorithms, designed to do everything from creating a video of a former […]

Read More

In a Multi-Cloud World, It’s Time to Rethink Who Has Access To What

The biggest challenge in today’s multi-cloud world is not storing data or supporting applications, but securing that data all along the “digital supply chain.” Given the economics of the cloud, and the sense it makes to use different kinds of clouds for different applications, arguments to leverage cloud today are rock solid. With weak security […]

Read More

The First Major Breach Of 2019 And What This Australian Story Teachs US

The first data breach this year happened January 1, when the private data of 30,000 Australian civil servants was stolen in an email phishing attack. The incident occurred when a directory was downloaded by an unauthorized third party after a government employee received a phishing email, and while no financial information was compromised, the stolen […]

Read More

Why Are Internal Threats Increasing? Five Questions to Ask…

A report published by Cyber-Security Insiders revealed eye-opening responses from CSOs, CIOs and other executives in global enterprises. In summary, their research (commissioned by CA Technologies) uncovered these five facts: Ninety percent of organizations feel vulnerable to insider attacks. The main enabling risk factors include too many users with excessive access privileges (37%), an increasing […]

Read More

Scalable Security for IoT Deployments: Privileged and Permissioned

IoT and Industrial IoT present the greatest network, data and application security challenges in recent history. In fact, some experts believe that the business potential for the connected world is being held back due to security concerns, and rightfully so. What’s holding IT, OT and network operations teams from large implementations, whether smart buildings or […]

Read More

Don’t Get Held Hostage: Innovations Address Ransomware

Ransomware is a troubling trend in the world of enterprise security. When a computer in an enterprise is “infected” with ransomware, it automatically and persistently tries to jump other computers and propagate through the network. One employee (out of thousands) can accidentally (or intentionally) install a ransomware, and until now, it has been almost impossible […]

Read More

Securing Virtualized Networks: A Pure Software Approach, Using Advanced Privileged Access Management

Service providers have spent billions virtualizing network functions and moving applications to the cloud; this calls for new approaches to software-driven security solutions. Privileged Access Management (PAM) is now extending into software-driven networking environments, at the carrier, service provider and large enterprise levels. After years of success controlling basic infrastructure, including servers, computers, and applications […]

Read More

It’s the Clouds: Multicloud Computing’s Unintended Consequences

Public cloud, private cloud, hybrid cloud, multi cloud – all have advantages, but the management of so much diversity can be brutal. Unify the management across clouds and save time and money, while managing risk. Over the last decade, we’ve gone from public cloud to private cloud, and from public/private to hybrid cloud; today, given […]

Read More

Premium Cloud Services with Access Security Embedded

Cloud computing providers can offer more secure access by working with network transmission partners, or offering their own connectivity services – the ante? Access management. The movement of enterprise and service providers to the cloud is clear, but we are starting to see hesitation based on security issues slow down cloud adoption, after a series […]

Read More