article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

Here are four evolving themes reverberating from RSAC 2023 that struck me: Password enabled access will endure for the foreseeable future. The trick in today’s operating environment is how to do this well with cloud migration accelerating. Leveraging threat intelligence at the platform level, or course, remains vital, as well.

Mobile 238
article thumbnail

MY TAKE: RSAC 2023 roundup – evidence of ‘stronger together’ innovation takes shape

The Last Watchdog

Here are three evolving themes reverberating from RSAC 2023 that struck me: Getting a grip on identities Password enabled access will endure for the foreseeable future. The trick in today’s operating environment is how to do this well with cloud migration accelerating.

Mobile 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Culture: From Onboarding Training to Proactive Practice

SecureWorld News

Other things to go over during this time include strong password management, multi-factor authentication (MFA), and the risks of using personal devices on work networks. Just as a lack of clear strategy is the leading issue with cloud migration, cybersecurity cultures will struggle to thrive without clarity. Avoid ambiguity.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

LW: You discuss password management and MFA; how big a bang for the buck is adopting best practices in these areas? Strong passwords can repel a brute force attack, but MFA is the extra layer of protection when a reused password is used in a credential stuffing attack.

article thumbnail

2024 Cybersecurity Industry Experts Predictions: Part 1

IT Security Guru

Mike Newman, CEO of My1Login: Cloud migration will expand the attack surface “In the last year organisations have continued to transform by moving more of their applications and data into the cloud. While this has improved the efficiency and availability of services, it has also expanded the enterprise attack surface.

article thumbnail

The Role Zero Trust Plays in Combating Privileged Credential Attacks

CyberSecurity Insiders

It only takes one compromised privileged credential to affect millions – identities, compliance fines potentially, lost intellectual property, lost shareholder value, or ransomware payments. It is designed to accommodate a dissolving perimeter and hybrid IT infrastructures resulting from digital transformation and cloud migration projects.

article thumbnail

Migrating from On Premise to Google G Suite

Spinone

While the “death of the corporate datacenter” has not entirely happened and may not happen completely, public cloud environments are being utilized and utilized heavily by today’s businesses. These concerns and challenges can present a tremendous roadblock to organizations desiring to move to public cloud environments.