If you had to secure a legion of workers in a short timeframe, could you do it? Hitachi did with Duo delivering MFA and zero trust, and Cisco Umbrella blocking threats. Read our customer success story on how Hitachi fortified its workforce
The need to implement zero trust at scale is growing ever more critical. In this video interview with Information Security Media Group, subject matter experts Srinivas Tummalapenta of IBM and Justin Douglas of Palo Alto discuss the guiding principles of scaling zero trust.
As governments grapple with persistent worker and skillset shortages, contractors have become essential for getting the work of government done. To do that work, contractors often require secure access to agency applications, processes and data. However, critical systems and confidential data typically reside in both...
Appgate has promoted CISO and Federal President Leo Taddeo to CEO and tasked him with capturing zero trust deployment opportunities with the U.S. Defense Department. Appgate has tapped Taddeo to help the Defense Department grant access to users based on context as part of a new zero trust strategy.
The embrace of the open internet as the new corporate network has created challenges around remote access and employee security, says Perimeter 81 CEO Amit Bareket. Perimeter 81 has attempted to simplify securing remote work by bringing ZTNA and SWG together on a single management console.
Many healthcare sector organizations would raise their security maturity levels if more CISOs and their teams approached security with business enablement as the objective, says Taylor Lehmann, director for the office of the CISO at Google Cloud.
How can successful organizations prepare for a possible recession? Most look for ways to reduce costs. Despite inflation and uncertainty, however, organizations aren't slowing their spend on security. Surprising? Maybe not. Savvy executives now see remote work as a cost-savings opportunity, and they're taking...
A carefully honed zero trust approach can allow healthcare entities to reduce pushback from clinicians while still "raising barriers appropriately" to prevent security incidents, says Dr. Eric Liederman, director of medical informatics and national privacy and security leader at Kaiser Permanente.
Information Security Media Group asked some of the industry's leading cybersecurity experts about the trends to watch in 2023. Responses covered a variety of emerging threats and evolving trends affecting security technologies, leadership and regulation. Here is a look at the year ahead.
A salute to the career of Johnson & Johnson CISO Marene Allison leads this week's Information Security Media Group Editors' Panel, which also reviews essentials for implementing a zero trust strategy and the use of banking standards to regulate blockchain-based digital assets.
The world changed in 2020 and so did international conglomerate Hitachi. The manufacturer underwent a total restructuring of how the company worked, going hybrid and unearthing a considerable new challenge: Authenticating and securing workers and devices when network boundaries were no longer clear.
With employees...
Chris Inglis intends to step down as head of the Office of the National Cyber Director inside the White House after President Joe Biden approves a new national cybersecurity strategy for critical infrastructure. The strategy will recommend a regulatory approach, a former congressional staffer says.
When we think about Zero Trust, four things need to happen every time someone tries to access an application... We know that vulnerabilities and their exploitation continue to be the root causes of most information security breaches today.
In fact, vulnerabilities unattended and unaddressed for months and even...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.