Agencies stress workflow, cyber basics in telework blitz Dear Adobe, Trend Micro users: Please vaccinate your software – at least some of these security holes were exploited in the wild Trump inches closer to exercising powers over medical supply chain…
3699 search results for "zero, trust"
IT Security News Daily Summary 2020-03-17
IT Security News Daily Summary 2020-03-16
Duo-Hosted SSO (Single Sign-on) Public Beta Is Here!
Introducing Duo-Hosted SSO Your users are human and understandably can take security shortcuts like reusing passwords or making them simple and easy to remember. Unfortunately, that can also make it easier for passwords to be compromised. Employees can access those…
IT Security News Weekly Summary – Week 11
IT Security News Daily Summary 2020-03-14
IT Security News Daily Summary 2020-03-13
Boost manufacturing security with a vendor access management strategy Beware scams exploiting coronavirus fears 2020-03-13 – Quick post: Qakbot infection How hospital CIOs can prepare for the onslaught of coronavirus patients Emsisoft Emergency Kit 2020.3.2 beta T-Mobile Offering Unlimited Smartphone…
CyberArk Alero’s expanded capabilities allow remote employees secure access to critical systems
CyberArk, the global leader in privileged access management, announced expanded capabilities of CyberArk Alero to support emerging business continuity priorities. Building on its core use case of enabling privileged access for remote vendors, Alero, a SaaS-based solution combining Zero Trust…
IT Security News Daily Summary 2020-03-12
Odo Security Offers Free Remote Access Solution for Employees Working from Home During the Coronavirus Outbreak
TEL AVIV, Israel and SAN FRANCISCO, March 12, 2020 (GLOBE NEWSWIRE) — Odo Security, a leader in zero trust network access (ZTNA) and management, today announced it is offering free subscriptions to its market-leading secure remote access solution, OdoAccess, to…
The 2020 CISO Benchmark Study: A Single Integrated Platform Can Thwart Alert Fatigue
The CISO Benchmark Study: Securing What’s Now and What’s Next The 6th annual CISO Benchmark Study just dropped and it is chock full of valuable information gathered from 2,800 cybersecurity IT decision makers from 13 countries to deep dive into…
IT Security News Daily Summary 2020-03-11
Implementing Effective Security Measures for Your Remote Workforce
In our previous blog we went over the best practices an organization can take to enable their employees to work safely from home during the coronavirus (COVID-19) outbreak without impacting the organization’s security and productivity. As we learned we need…
IT Security News Daily Summary 2020-03-10
Passwords still dominant authentication method, top cause of data breaches
Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user. EMA…
IT Security News Weekly Summary – Week 10
IT Security News Daily Summary 2020-03-08
IT Security News Daily Summary 2020-03-07
IT Security News Daily Summary 2020-03-06
IT Security News Daily Summary 2020-03-05
Why is identity and access management so important in preventing data breaches?
Access Management solutions provide authentication and authorization services and enforce user access policy to a company’s employees and customers across the web, mobile apps, and other digital channels. At its core, identity and access management is really all about ensuring…
IT Security News Daily Summary 2020-03-04
IT Security News Daily Summary 2020-03-03
Project Svalbard, Have I Been Pwned and its Ongoing Independence
Presently sponsored by: Duo. Modern security is evolving beyond the perimeter. Download Five Steps to Perimeter-Less Security and secure your application access. This is going to be a lengthy blog post so let me use this opening paragraph as a…
R.A.D. – My Perspective of RSA 2020
After being immersed in the mayhem that is RSA I often wonder if it is what you miss rather than what you see that is so intriguing. The range of activities and opportunities to listen are immense. The expo floor…
IT Security News Daily Summary 2020-02-28
Getting Started with CMMC: Why Cybersecurity Maturity Levels for Defense Contractors Will Shine in 2020
The struggle is real. How can the US Department of Defense (DoD) reasonably secure data of their supply chain that supports $716B in congressional funds? With over 300,000 companies holding defense contracts, there’s significant risk associated with sizable user groups…
Wallarm advances API security with native gRPC and GraphQL support
At RSA Conference 2020, Wallarm released an expanded set of parsers, detection of API-specific vulnerabilities and API schema analysis for gRPC and GraphQL. With Wallarm context-specific protection is delivered both for externally-facing APIs and for service-to-service internal APIs for a…
IT Security News Weekly Summary – Week 08
IT Security News Daily Summary 2020-02-23
IT Security News Daily Summary 2020-02-22
IT Security News Daily Summary 2020-02-21
Thinking Strategically About Passwordless
The best security control is the security control people actually use. We’ve shifted from enforcing security to creating security that users want to adopt. When it comes to zero trust, one thing many of us have been considering is how…
CyberX integrates with Microsoft Azure Security Center
CyberX announced a new API-level integration with Microsoft Azure Security Center for IoT, enabling joint clients to gain a unified view of security across all their managed and unmanaged IoT devices. The combination of CyberX’s agentless security platform and Azure…
IT Security News Daily Summary 2020-02-20
IT Security News Daily Summary 2020-02-19
Learn the Latest in Cybersecurity For Healthcare Industry at HIMSS 2020
It’s time to get your yearly dose of HIMSS conference in Orlando, Florida! Join Duo Security and all your favorite healthcare information and technology professionals from around the world at the Orange County Convention Center for this year’s Healthcare Information…
IT Security News Daily Summary 2020-02-18
12 hottest new cybersecurity startups at RSA 2020
Starting on February 24, the RSA Conference (RSAC) 2020 gives security vendors old and new a chance to demonstrate their capabilities. The event has become an attractive venue for startups to make their debut. This year’s crop will be demonstrating…
IT Security News Daily Summary 2020-02-17
IT Security News Daily Summary 2020-02-16
Perimeter 81 unveils new SASE platform combining NaaS with cloud security capabilities
Perimeter 81, a leading Zero Trust network provider for enterprises and organizations, announced a new Secure Access Service Edge (SASE) platform that combines its Network as a Service offering with advanced cloud security capabilities from SonicWall, a Francisco Partners portfolio…
IT Security News Daily Summary 2020-02-12
#WeAreDuo Employee Spotlight with PMM Amanda Rogerson
Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their jobs or important lessons they’ve learned while working at Duo? …
Office 365 Migrations Simplified
The Top Four Takeaways From the “Simplifying Office 365 Migrations” Webinar. The cloud evolution of Microsoft Office has made it into one of the most widely used cloud services by corporate employees. According to Microsoft1, Office 365 has over 180…
IT Security News Daily Summary 2020-02-11
How Duo Blocks Vulnerable Endpoints From Accessing Applications
This is the second of a four-part blog series on how Duo helps organizations in verifying device trust. Gartner predicts that, through 2020, 99% of vulnerabilities exploited will continue to be the same ones known for at least one year…
IT Security News Daily Summary 2020-02-10
IT Security News Weekly Summary – Week 06
IT Security News Daily Summary 2020-02-07
Weekly Update 177
Presently sponsored by: Duo. Modern security is evolving beyond the perimeter. Download Five Steps to Perimeter-Less Security and secure your application access. I’ve got audio! Ok, so I cheated a bit in terms of recording back in the home office,…
IT Security News Daily Summary 2020-02-06
IT Security News Daily Summary 2020-02-05
IT Security News Daily Summary 2020-02-04
HPE Acquires Identity Management Firm Scytale
Hewlett Packard Enterprise (HPE) on Monday announced that it has acquired Scytale, an identity management startup that specializes in cloud-native security and zero trust networking. read more Advertise on IT Security News. Read the complete article: HPE Acquires Identity…
IT Security News Daily Summary 2020-02-03
Mobile Banking Malware On The Rise, 50% Hike In Attacks! WhatsApp a Dependable Medium?
According to studies, with an increase of 50% malware attacks have known no bounds in the past year. Most common of all happen to be malware that steals users’ financial data and bank funds. The banking malware is on the…
IT Security News Weekly Summary – Week 05
IT Security News Daily Summary 2020-02-02
IT Security News Daily Summary 2020-02-01
IT Security News Daily Summary 2020-01-31
Do You Need to Create Segmented Networks to Protect Critical Assets?
Network segmentation — the act of dividing a network into multiple smaller, isolated networks that are not visible from the outside — has long been used to reduce cyber risk. At its core, segmentation assumes a “zero trust” approach to…
IT Security News Daily Summary 2020-01-30
Say hello to OpenSK: a fully open-source security key implementation
Posted by Elie Bursztein, Security & Anti-abuse Research Lead, and Jean-Michel Picod, Software Engineer, Google Today, FIDO security keys are reshaping the way online accounts are protected by providing an easy, phishing-resistant form of two-factor authentication (2FA) that is trusted…
IT Security News Daily Summary 2020-01-29
Kindite unveils beta version to protect data even when leaked
Kindite, a Tel-Aviv based cybersecurity company that creates Zero-Trust Environments to protect data in the cloud, has launched a beta version allowing IT and security teams to have a new level of control over their cloud environment. Kindite allows encryption…
IT Security News Daily Summary 2020-01-28
NEW REPORT: Customer Chronicles: Securing State and Local Government Agencies with Strong MFA
State and local government agencies’ networks and systems contain mountains of sensitive citizen data – from financial info to social security numbers to voter registrations. This puts them in a unique position and makes them an attractive target for potential…
IT Security News Daily Summary 2020-01-27
IT Security News Weekly Summary – Week 04
IT Security News Daily Summary 2020-01-24
IT Security News Daily Summary 2020-01-23
IT Security News Daily Summary 2020-01-22
Tale of Jailbreaking Disobedient IoT Appliances Shortlisted for the National Canada Reads Prize Vivin Nets Thousands of Dollars Using Cryptomining Malware Multiple Vulnerabilities Found in AMD ATI Radeon Graphics Cards Security clearance backlog continues to drop Safari’s Intelligent Tracking Protection…
IT Security News Daily Summary 2020-01-21
2020 And Beyond: Idaptive’s Predictions and Expectations for the New Decade
Our predictions and expectations - Zero Trust, artificial intelligence and machine learning driven identity security, and password-less authentication are coming with the dawn of the new decade. The close of a year is a natural time for reflection, and when it…
IT Security News Weekly Summary – Week 03
IT Security News Daily Summary 2020-01-19
IT Security News Daily Summary 2020-01-18
IT Security News Daily Summary 2020-01-17
How agencies can protect themselves against DNS attacks
Government must segment their network architecture and adopt a zero-trust strategy. Advertise on IT Security News. Read the complete article: How agencies can protect themselves against DNS attacks
Minimizing Your Exposure to Windows CVE-2020-0601
Duo has a strong technical partnership with Microsoft and we work closely to provide security solutions to solve challenges that our customers may be facing. As you may be aware, there was recently a critical vulnerability disclosed by Microsoft which…
IT Security News Daily Summary 2020-01-16
IT Security News Daily Summary 2020-01-15
IT Security News Daily Summary 2020-01-13
Account Security: One Healthy New Year’s Resolution You Will Need in 2020
It’s January, and the unwanted chore of removing all the decorations and taking down the tree is lingering, while the thought of joining hundreds of others in the lines to return the unwanted gifts is actually making you excited to…
IT Security News Weekly Summary – Week 02
IT Security News Daily Summary 2020-01-10
Top 10 Most Discussed MacRumors Stories of 2019: AirPower Canceled, Apple Card Launches, and More
MacRumors published thousands of stories in 2019, as part of our continued coverage of the latest Apple news and rumors. Below, we look back at the top 10 most discussed stories of the year in our forums, with topics ranging…
IT Security News Daily Summary 2020-01-09
RSA Conference 2020: Explore the Human Element of Security With Duo
Something big is happening in February 2020, and Duo has been hard at work getting ready! We’re not talking about Valentine’s Day, or Presidents’ Day, or even Groundhog Day (though all of those are great, too). No, we’re getting pumped…
Accomplishing SOC 2 Type II in the Cloud-Native Kubernetes Era
We’re excited to announce that ShiftLeft has achieved Service Organization Control 2 Type II compliance with zero exceptions. We began this compliance effort 10 months ago. Back in May 2019, we achieved SOC 2 Type I compliance. While this was…
IT Security News Daily Summary 2020-01-08
Cloudflare for Teams: Protecting corporations without sacrificing performance
Cloudflare, the security, performance, and reliability company helping to build a better Internet, announced that it has launched Cloudflare for Teams, a set of solutions that will secure corporations and their employees globally, without sacrificing performance. Cloudflare for Teams is…
Cloudflare for Teams: Protecting corporations and employees, without sacrificing performance
Cloudflare, the security, performance, and reliability company helping to build a better Internet, announced that it has launched Cloudflare for Teams, a set of solutions that will secure corporations and their employees globally, without sacrificing performance. Cloudflare for Teams is…