Remove Authentication Remove CISO Remove Cyber Risk Remove Firewall
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Cloud dominance . Security landscape requires adaptation .

CISO 97
article thumbnail

Why CISOs at gaming companies need to reimagine security

SC Magazine

The hack of Words with Friends in 2019 was high-profile, but today’s columnist, Yuval Elddad of CYE, says CISOs at all gaming companies have to take a closer look at the growing threats to online gaming platforms. The last thing players want to think about when they log onto their favorite game are cyber-risks.

CISO 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. Role-based access controls, multi-factor authentication, and adherence to standard screening checklists are essential to securing the cloud environment. Zero Trust has come of age.

article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

Pity the poor CISO at any enterprise you care to name. As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. And the usual collection of security tools – firewall, endpoint detection, intrusion detection, SIEM, etc.

article thumbnail

How MFA and Cyber Liability Insurance Effectively Manage Risk in Higher Education

Duo's Security Blog

One area where campuses have been collaborating recently are changes around cyber liability insurance for higher education, an opportunity for campus cybersecurity teams to combine forces with their risk management team. In a recent Duo blog post, we gave an overview of cyber liability insurance.

article thumbnail

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

Cisco Security

ny of the themes introduced in the code of practice can be aligned with the themes in a zero trust security model, which are also a focus for CISOs. As well as helping to mitigate the significant cyber risks presented to the telecoms industry, a zero-trust strategy provides many business benefits.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

SAP National Security Services (NS2) CISO Ted Wagner told eSecurityPlanet that network slicing “adds complexity, which may lend itself to insecure implementation. Incentivizing a Cyber Duty of Care. The post Cybersecurity Risks of 5G – And How to Control Them appeared first on eSecurityPlanet.

Risk 137