IT News - Security

10 Security Technologies To Secure Remote Work
Security Boulevard, April 27th, 2022
The recent global pandemic forever changed the way people work. These days, more and more people are working remotely, but much of that remote access technology is exposed to external threats.

Ron Stefanski writes in Security Boulevard, "The move to online working has provided tons of new opportunities for cybercriminals looking to exploit unsecured technology systems.

This, in turn, has resulted in an increased need for integrating security technologies into remote workspaces to secure communications and transfer of private employee, business or consumer data.

If you have remote workers, then you need to pay extra attention to securing the technology your workers are using..."

With that in mind, here are 10 ways you can maintain cybersecurity for your remote workforce.

A thorough insider threat program includes plan preparation, threat assessment, and plan review and renewal. Learn how to implement this three-step model to protect your company.

"Insider threats continue to be a potent attack vector across every industry vertical," warns Ashwin Krishnan in SearchSecurity.

"Insider attacks -- whether malicious or negligent -- can lead to system outages, data theft, ransomware and advanced persistent threats.

A challenging aspect of insider threats is that they can be even more difficult to detect than external threats. Insiders can capitalize on their unique insights into their organization's systems and launch attacks that are undetectable or appear to fall within acceptable behavioral norms..."

The security industry is failing to keep pace with evolving cybercrime tactics, techniques and procedures as security and IT teams face mounting expectations to keep their organizations protected from such threats.

"This was the result of a Vectra AI survey of 1,800 global IT security decision-makers at companies with over 1,000 employees," writes Nathan Eddy in Security Boulevard, "which found that in the last year, 74% of respondents experienced a significant security event within their organization that required an incident response effort.

Nearly eight in 10 (79%) security decision-makers said they have bought tools that have failed on at least one occasion and cited poor integration, failure to detect modern attacks and lack of visibility as reasons for the failures..."

Identity and access management tools play a critical role in an enterprise's security infrastructure, requiring users to pass authentication tests for each session.

"IAM solutions allow organizations to manage all network users and set policies to control their access to sensitive applications," writes Jenna Phipps in CIOinsight.

"For enterprises seeking to tighten access to applications, particularly those with important data, selecting the right IAM tool is an important first step..."

The speed versus risk balance is always in question while considering identify and access management in enterprise transformation scenarios

Ashraf Motiwala, Chad Wolcott, and Dusty Anderson writes in CIO, "Identity and Access Management(IAM) is the cornerstone of security. Proper IAM enables legitimate internal and external users to access the right data at the right time from the right devices. While IAM may seem like a check box in the journey to technology transformation, its role is much larger.

CIOs identify and focus on current strengths and weaknesses to arrive at a best-of-breed IAM solution that is structurally sound and integrates well in the organizational technology ecosystem. They implement IAM programs that enable efficiency and trim duplicative or overlapping technologies so that organizations are not over-licensed for capabilities that will not be utilized..."

A Breath Of Fresh Air For A Busy CISO
HolistiCyber, April 27th, 2022
We've all been there. As Chief Information Security Officer (CISO), your team, your management, and your board are all clamoring for your time.

Not to mention the dozens of items calling you from your inbox and notification dashboards that all are demanding your immediate attention. The threat landscape is rapidly changing, with warnings being issued by government agencies about nation-state grade attacks coming out of a European war zone.

It can be incredibly overwhelming, and sometimes the only thing you can do to stay sane is turn off your monitor to clear your head for a few minutes, so you can get back to it with fresh eyes.

See all Archived IT News - Security articles See all articles from this issue