article thumbnail

New Nemertes Study Reveals Benefits of Zero Trust Extend Far Beyond Network Security

CyberSecurity Insiders

NEW YORK–( BUSINESS WIRE )– Nemertes , a global research-based advisory and consulting firm that analyzes the business value of emerging technologies, announces the release of a Real Economic Value study on Appgate SDP , an industry-leading Zero Trust Network Access (ZTNA) solution.

article thumbnail

Architecture Matters When it Comes to SSE

CyberSecurity Insiders

More importantly, you need to understand how a particular solution deploys its network “points of presence” or PoP. To paraphrase a well-known movie from 2002, “SSE, it’s all about the PoPs.” It also, most importantly, causes the network/security engineer back into the performance vs security dilemma.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Should the CISO Report to the CIO?

Cisco Security

The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. Viewed another way, having the CISO report to the CIO relegates cybersecurity to an IT security, or technology, function.

CISO 109
article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. That windy winter day in northern New Jersey definitely set my security career on a new course. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor.

article thumbnail

What does WiFi stand for?

Malwarebytes

” Some members of the WiFi Alliance, the wireless industry organization that promotes wireless technologies and owns the trademark, may even have encouraged this misconception. technology” doesn’t quite roll off the tongue. technology” doesn’t quite roll off the tongue. How does WiFi work?

article thumbnail

A people counter that didn’t add up and the dangers of the COVID IoT boom

SC Magazine

But the rush to purchase these devices, and fly-by-night operators to bring them to market, means security can fall to the wayside. According to its website, the London-headquartered firm has been operating since 2002 and counts a wide range of users, from L’Occitane to Levis, casinos to libraries.

IoT 121
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

Vamosi: In 2002, I wrote an article for ZDNET titled “Jail Time is Not The Answer to Cyber Crime.” ” I wrote about the pending Cyber Security Enhancement Act of 2002 (CSEA) and said: “ The problem with this legislation is that it's often very difficult to determine who is responsible for any given cybercrime.

Hacking 52