Venafi has launched a new product that the company describes as a mobile device "kill switch" which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.
The Department of Defense will require defense contractors to incorporate established information security standards on their unclassified networks and to report cyber-intrusion incidents that result in the loss of unclassified controlled technical information.
Implementing a more mature cyber security profile within automation means an investment in both time and resources. Being able to measure business performance in real-time is the first step in justifying the ROI of this much-needed increase in cyber security controls.
The National Security Agency is gathering email and instant messenger contact lists from hundreds of millions of ordinary citizens worldwide, many of them Americans, The Washington Post reported late Monday.
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of “never trust, always verify”.
Just like football, security is a tough game and not for the faint of heart. There are threats lurking around every corner and it’s when you think you are in the clear that a blindside hit is most likely to happen.
Over the past year the buzz around tracking threat actors has been growing and in my opinion hitting the height of the hype cycle. Relying on behavior profiles alone is a great way to get an unwelcomed outcome.