article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

When developing a security strategy for supporting a hybrid workforce, it is essential to identify risks, as well as any potential blind spots. As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. Security landscape requires adaptation .

CISO 97
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. Is it surprising that there’s a correlation between something like IoT exposure and other security issues?

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The same philosophy applies to ABCWUA’s installation of its cloud-based enterprise network security software.

CISO 82
article thumbnail

Why digital certificates are critical to 5G security

The Security Ledger

As 5G gains traction, service providers need to be able to trust their networkssecurity to truly take advantage of 5G’s capabilities. The post Why digital certificates are critical to 5G security appeared first on The Security Ledger with Paul F. Digital certificates are critical to that, writes Alexa Tahan of Nokia.

CISO 52
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. But what are your options for proactive protection when the notion of a walled-in network has been shattered by the proliferation of new IoT devices, growth of cloud services, and new hybrid work from home models?

DNS 140
article thumbnail

Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites

eSecurity Planet

How CISOs Should Respond. The threat of DDoS attacks continues to evolve as a threat that can have grave impacts to business operations as companies migrate more resources to the cloud, migrate workforces to remote and/or hybrid environments, and lean on IoT connectivity to conduct operations,” Bayers said.

DDOS 107
article thumbnail

Microsegmentation Is Catching On as Key to Zero Trust

eSecurity Planet

Those findings appear in The State of Microsegmentation in Network Security , a Byos report that details the results of a Q3 2021 survey of 100 cybersecurity leaders. In an interview with eSecurity Planet , Byos founder and CEO Matias Katz discussed the findings and their implications for network security in general.