The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though they were significantly outnumbered. Despite the fact king Leonidas did not know much about enterprise-grade security, there are multiple decisions that he had […]
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting […]
Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software running in the datacenter. While managed virtual desktop infrastructure has provided a full desktop in the datacenter since the early 2000’s, and has […]
As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing $3.92 million worldwide and $8.19 million in the US, and resulting in untold damages to reputations and customers, it’s easy to see why. […]
As a CISO, your cyber security strategy plan drives data protection for the organization across every aspect of business processes including new hires and onboarding. It’s not uncommon for an organization to have an HR step where the hiring manager requests network account credentials and permissions for a new employee. Without the right procedures in […]
Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships. But we’re not talking psychology today. We’re talking cybersecurity. And when it comes to IT infrastructure, vulnerabilities are nothing but bad. The average cost of a data security breach is $3.92 million worldwide and […]
You know how security experts keep telling you not to use the same password on multiple accounts? Yup, there’s a good reason for that. It’s called credential stuffing. It’s a type of cyberattack that affects the security of millions of people. As bad as that might sound, there are ways to prevent such attacks and […]
No sane person would say cyber security is under control. We’ve all read about way too many data breaches that expose sensitive corporate and personal information, putting hundreds of thousands or millions of people at risk, costing companies enormous sums of money, and damaging corporate reputations. In an attempt to win more battles than they […]
Cyber security professionals are, by definition, in the risk management business. Your job is all about making sure information systems and sensitive data are protected against cyber attacks. And now with COVID 19 pushing more workers — and work — online than ever before, getting a handle on your evolving risk couldn’t be more critical. […]
What are the best Privileged Access Management (PAM) Solutions in 2020? The answer depends on who you ask and what your particular needs might be. It’s not like the Miss America Pageant, where one lucky winner takes home the crown. Rather, potential buyers of PAM, as the technology is often called, have their choice of […]