Remove Architecture Remove Authentication Remove CISO Remove Digital transformation
article thumbnail

Top of Mind Security Insights from In-Person Interactions

Cisco Security

After two years of virtual engagements, in-person events like our CISO Forum and Cisco Live as well as the industry’s RSA Conference underscore the power of face-to-face interactions. Digital transformation and Zero Trust . It’s a reminder of just how enriching conversations are and how incredibly interconnected the world is.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Digital Transformation In 2024, several trends are expected to shape the landscape of digital transformation. To counter advancing cyber threats, organisations will implement more sophisticated security measures like multi-factor authentication, micro-segmentation, and continuous monitoring.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building confidence in employee identity protection is core to zero trust security

Thales Cloud Protection & Licensing

87% of companies report their CISO has an ownership and leadership role with IAM, while 45% of CISOs own both strategy and implementation for overall identity and access management initiatives. These businesses leverage user behavior to step up authentication, building more confidence on employee identity protection. Conclusion.

CISO 71
article thumbnail

Zero Trust Is a Journey and Businesses Have Many Rivers to Cross

Thales Cloud Protection & Licensing

Digital transformation, proliferation of location agnostic technologies and immense data generation have created uncontrolled remote environments and a fragmented enterprise ecosystem, rendering legacy security policies and practices based on trust obsolete. Zero Trust Is a Journey and Businesses Have Many Rivers to Cross.

article thumbnail

My 2020 Predictions Revisited: What Worked, What Didn't

Duo's Security Blog

Defenses in 2020 The rapid shift to remote work this year propelled digital transformation, cloud adoption, and securing it all with zero trust principles. User and entity behavior analytics (UEBA) made significant strides as one way of determining trust in a zero-trust architecture. Well, it was. But then it wasn’t.

article thumbnail

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — Be the Answer to Secure Connectivity?

The Last Watchdog

SASE (pronounced sassy) replaces the site-centric, point-solution approach to security with a user-centric model that holds the potential to profoundly reinforce digital transformation. It’s called Secure Access Service Edge, or SASE , as coined by research firm Gartner.

Firewall 213
article thumbnail

The Road to Zero Trust

Thales Cloud Protection & Licensing

Some see this as a catalyst for the so-called digital transformation. One of the biggest challenges is likely to be, how you actually make the transition to a Zero Trust model whilst still having to maintain investment from your previous IT security tools and architectures, which were likely built around more perimeter-based models.

Risk 78