Remove CISO Remove Cybersecurity Remove Digital transformation Remove VPN
article thumbnail

The four cybersecurity trends to watch in 2023

CyberSecurity Insiders

By: Matt Lindley, COO and CISO of NINJIO. When employees aren’t in the office, they’re liable to engage in risky behaviors such as using unsecured WiFi without a VPN, leaving work devices unlocked in public places, and clicking on malicious emails. This is why cybersecurity education has never been more important.

article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

Senior C-level executives and board members are paying more attention now to cybersecurity than two years ago, by far,” observes Jeff Pollard, vice president and principal analyst at tech research firm Forrester. That’s the ‘cheat code’ for CISO success. Awareness is a vital step forward, no doubt. But it’s only a baby step.

CISO 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Think of remote access as a business continuity issue

SC Magazine

A little more than a year ago I had the opportunity to interview 40 CISOs about their enterprise access challenges. They understood the limitations of virtual private networks (VPNs), yet not one IT leader had the appetite or intention of replacing their legacy access approach. FBI CreativeCommons (Credit: CC PDM 1.0). Business stops.

article thumbnail

New Nemertes Study Reveals Benefits of Zero Trust Extend Far Beyond Network Security

CyberSecurity Insiders

From streamlining the onboarding of new customers and accelerating digital transformation to improving employee satisfaction, this study shows how a Zero Trust Network Access security approach can serve as a springboard for innovation.” Appgate SDP is highly strategic to Zero Trust security initiatives. About Appgate.

article thumbnail

Combatting ransomware: a holistic approach

IT Security Guru

Similarly, and this might sound odd from someone in a senior position at a cybersecurity company, but businesses sometimes rely too much on the technology, and not enough on process, personnel and their skills. A firewall or a VPN Gateway, for example, may provide information, which could be used to identify potential attack vectors.