article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. We’re able to roll that out not only for our desktop computers and for laptops and for VPN clients, but even for mobile devices,” said Sanders. “So

CISO 82
article thumbnail

Bridging the Security Gaps in Healthcare With Trusted Access

Duo's Security Blog

This report Bridging Healthcare Security Gaps: Better Authentication Improves Controls aims to bring clarity and solutions to these security gaps. Three things keep healthcare CISOs up at night, first, the industry is highly targeted by cyber criminals. A proactive approach can help healthcare organizations (HCOs) avoid these problems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The four cybersecurity trends to watch in 2023

CyberSecurity Insiders

By: Matt Lindley, COO and CISO of NINJIO. When employees aren’t in the office, they’re liable to engage in risky behaviors such as using unsecured WiFi without a VPN, leaving work devices unlocked in public places, and clicking on malicious emails. Companies should also provide clear channels for reporting suspicious incidents.

article thumbnail

New 2020 Duo Trusted Access Report Examines Securing Remote Work

Duo's Security Blog

The time has come where we analyze authentication data and produce our wildly popular Duo Trusted Access Report. The report examines 26 million devices used for work and 700 million user authentication events per month to more than 500,000 unique corporate applications, based on de-identified and aggregated data from Duo’s customer base.

article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

We find many CISOs spend their time explaining what threats matter and why, as opposed to why cybersecurity matters in the first place,” he says. Within hours after a public disclosure about vulnerabilities that needed patching in enterprise-grade VPN, threat actors shifted into high gear. That’s the ‘cheat code’ for CISO success.

CISO 185
article thumbnail

How to Prevent and Protect Against Supply Chain Attacks

Thales Cloud Protection & Licensing

The underlying rule should be to expand modern and multi-factor authentication to all users and applications in your organization, whether those apps reside on-prem or in the cloud. Not all Authentication Methods are Created Equal. Most organizations today rely on authenticator apps and Push OTP for MFA. VPN Protection.

article thumbnail

(VIDEO) Getting Started With Duo - Step 4: Setting Up an Application

Duo's Security Blog

We covered differentiating user authentication methods , Duo enrollment and self-remediation and Duo Admin Dashboard and Device Insight so far. Install Duo Mobile on your Android or Apple smartphone and scan the barcode shown on-screen to activate Duo Push two-factor authentication for your Duo administrator account.If