Organizations are prioritizing strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture, a ReliaQuest and Ponemon Research survey reveals. Among the roadblocks to achieving a r…Read More Organizations prioritize strategic security programs, but lack fundamentals
Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the recent sharp increase in ransomware and other sophisticated cyberattacks, the …Read More Zero trust security solutions widely adopted, spurred by surge in ransomware
COVID-19 quickly ushered in the era of remote work, introducing new risks that IT professionals are struggling to manage with existing security tools, according to a Thales study. Six in 10 respondents said traditional security tools such as VPNs are s…Read More Modern security strategies key to support remote workforce demands
The pandemic has had a significant impact on the way we work, and one of our recent research studies found that nearly 65% of companies expect some or all their workforce to remain remote indefinitely. Unfortunately, last year’s sudden transition has c…Read More A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world
In the wake of the Colonial Pipeline attack and other high-profile cases, IT teams may be scrabbling to shore up their endpoint protection. But those in the developer community know security weaknesses don’t begin and end there; write code improperly o…Read More Top tips for preventing SQL injection attacks
The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and individuals across the globe, but now the tide is turning. As technology advance…Read More Out with the old, in with the new: From VPNs to ZTNA
We are operating in the most complex cybersecurity landscape we’ve ever seen. Sophisticated and determined attackers are the norm. And we all are preparing for the next great disruption—hybrid work.
The post How to secure your hybrid work world with a Zero Trust approach appeared first on Microsoft Security.Read More How to secure your hybrid work world with a Zero Trust approach
A rapid proliferation of IoT has opened unsupervised doors to cybercriminals. How can we apply the principles of Zero Trust to address this challenge?
The post How to apply a Zero Trust approach to your IoT solutions appeared first on Microsoft Security.Read More How to apply a Zero Trust approach to your IoT solutions
As companies exit the pandemic, security leaders will be challenged with new data security complexities. Remote work over the past year magnified challenges that companies face around protecting data exposure and file exfiltration from insider risk, an…Read More Pandemic accelerating need for insider risk management
Training to increase employees’ security awareness and change risky behaviours among end users is important, particularly as the future workplace will be hybrid and many professionals will still be working remotely. After all, you don’t want your emplo…Read More Secure your cloud: Remove the human vulnerabilities
It is widely known that the healthcare industry is a primary target for cyberattack, with increasingly sophisticated and highly-motivated adversaries seeking to exploit both human and technological vulnerabilities more frequently than ever before. To b…Read More Healthcare organizations implementing zero trust to tackle cyberattacks
New Microsoft Defender for Endpoint capabilities let organizations discover and secure unmanaged workstations, mobile devices, servers, and network devices.
The post Secure unmanaged devices with Microsoft Defender for Endpoint now appeared first on Microsoft Security.Read More Secure unmanaged devices with Microsoft Defender for Endpoint now
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, February 2021.Serious Linux VulnerabilityLast month a newly discovered critical vulnerability …Read More Cyber Security Roundup for March 2021
The global zero trust security market size is projected to grow from $19.6 billion in 2020 to $51.6 billion by 2026, recording a compound annual growth rate (CAGR) of 17.4% from 2020 to 2026, according to MarketsandMarkets. The major growth drivers for…Read More Worldwide zero trust security market size to reach $51.6 billion by 2026
Email data breaches are on the rise. Our recent research found that 93% of organizations have experienced an email data breach in the last 12 months, at an average rate of one incident every 12 working hours. The vast majority of these incidents are ca…Read More Why contextual machine learning is the fix that zero-trust email security needs
During the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in the future of work. A study by Mercer revealed 94% of employers agreed that pro…Read More Protecting productivity within the disappearing perimeter
The corporate network perimeter has been completely redefined. Many IT leaders are adopting a Zero Trust security model where identities play a critical role in helping act as the foundation of their modern cybersecurity strategy. As a result, cybercriminals have shifted their focus and identities are increasingly under attack.
The post Why threat protection is critical to your Zero Trust security strategy appeared first on Microsoft Security.Read More Why threat protection is critical to your Zero Trust security strategy
From the global pandemic to recent cyberattacks, our world has faced many challenges during the past 12 months. Some of these challenges we can’t change. However, I’m pleased about the ones we can, and are changing across the cybersecurity landscape.Read More Modernizing your network security strategy
The lessons we have learned during the past 12 months have demonstrated that the ability to respond to, and bounce back from adversity in general, can impact the short-and long-term success of any organization. It can even dictate the leaders and laggards in any industry.
The post Why operational resilience will be key in 2021, and how this impacts cybersecurity appeared first on Microsoft Security.Read More Why operational resilience will be key in 2021, and how this impacts cybersecurity
Whether you are managing cybersecurity, information security, operations security, or physical security, the sense of urgency to address the potential of attack or breach will continue to rise in 2021….Read More The 2021 Security Trends You Need to Follow
Article by Dennis Okpara, Chief Security Architect & DPO at IDEE GmbHYes, there is hope for 2021, but the challenges of the “New Normal” are here to stay. CISOs have to prepare and start acting now, because cybersecurity and the IT-infrastruct…Read More Trends in IT-Security and IAM in 2021, the “New Normal” and beyond