Remove Architecture Remove Cybersecurity Remove Risk Remove Whitepaper
article thumbnail

WHITEPAPER: Authentication Does Not Equal Zero Trust

Security Boulevard

Many vendor claims are unclear as to what they’re promising in this space, but they are quite insistent that without Zero Trust network architectures, organizations are at great risk for data breaches and other network sabotage. The post WHITEPAPER: Authentication Does Not Equal Zero Trust appeared first on Security Boulevard.

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

“ Safety First For Automated Driving ” is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. One way to read it is that those disciplines have strongly developed safety cultures, which generally do not consider cybersecurity problems. I find some parts of it surprising. (I

Risk 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

Can the cybersecurity industry learn anything from the problems encountered with the move from the deprecated SHA-1 to the stronger and safer SHA-2 hashing algorithm? For businesses still using the broken SHA-1, they were facing serious risks , including: Increased possibility of a collision or man-in-the-middle attack. Crypto-agility.

article thumbnail

MITRE ATT&CK: The Magic of Application Mitigations

Cisco Security

Today’s application architectures support fast, continuous innovation. Back end architectures use small, independent code modules called microservices. Clearly today’s application architectures use a lot of components, making them more complex, but the benefits run deep. Complexity breeds security risk. Trustworthy.

article thumbnail

Establishing Security Maturity Through CIS Cyber Defense Framework

McAfee

In this blog we set out to see how choosing the correct security controls framework can go a long way in establishing a secure foundation, which then allows Enterprise security designers/decision makers to make more informed solution choices while selecting the controls and vendor architectures.

article thumbnail

To Achieve Zero Trust Security, Trust The Human Element

Thales Cloud Protection & Licensing

With more employees working remotely than ever before due to COVID-19, businesses are at greater risk from a cyber-attack with workers accessing systems outside of the usual company network. You can’t scrimp on discovery, but no standard risk assessment scales. Finally, embrace third party risk management.

article thumbnail

If Infosec Was a Supermarket Business

Security Boulevard

By Jordan Durham I was recently reading an article which made a brief analogy between cybersecurity and a retail store. This got me thinking – could there be a deeper analogy made for cybersecurity and a supermarket, especially detection and response programs? So, if we apply this to our analogy, we could class this data as low risk.

InfoSec 52