article thumbnail

The four cybersecurity trends to watch in 2023

CyberSecurity Insiders

By: Matt Lindley, COO and CISO of NINJIO. When employees aren’t in the office, they’re liable to engage in risky behaviors such as using unsecured WiFi without a VPN, leaving work devices unlocked in public places, and clicking on malicious emails. Companies should also provide clear channels for reporting suspicious incidents.

article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

We find many CISOs spend their time explaining what threats matter and why, as opposed to why cybersecurity matters in the first place,” he says. Within hours after a public disclosure about vulnerabilities that needed patching in enterprise-grade VPN, threat actors shifted into high gear. That’s the ‘cheat code’ for CISO success.

CISO 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Think of remote access as a business continuity issue

SC Magazine

A little more than a year ago I had the opportunity to interview 40 CISOs about their enterprise access challenges. They understood the limitations of virtual private networks (VPNs), yet not one IT leader had the appetite or intention of replacing their legacy access approach. FBI CreativeCommons (Credit: CC PDM 1.0). Business stops.

article thumbnail

New Nemertes Study Reveals Benefits of Zero Trust Extend Far Beyond Network Security

CyberSecurity Insiders

From streamlining the onboarding of new customers and accelerating digital transformation to improving employee satisfaction, this study shows how a Zero Trust Network Access security approach can serve as a springboard for innovation.” Appgate SDP is highly strategic to Zero Trust security initiatives.

article thumbnail

Combatting ransomware: a holistic approach

IT Security Guru

A firewall or a VPN Gateway, for example, may provide information, which could be used to identify potential attack vectors. Digital transformation and the move to remote work has fundamentally changed the way modern businesses operate. Contributed by Nicolas Casimir, CISO, Zscaler EMEA. Consider Zero Trust.

article thumbnail

Zero Trust Is a Journey and Businesses Have Many Rivers to Cross

Thales Cloud Protection & Licensing

Digital transformation, proliferation of location agnostic technologies and immense data generation have created uncontrolled remote environments and a fragmented enterprise ecosystem, rendering legacy security policies and practices based on trust obsolete. “In Zero Trust Is a Journey and Businesses Have Many Rivers to Cross.