article thumbnail

4 strategies to help reduce the risk of DNS tunneling

CSO Magazine

Domain name system (DNS) tunneling is a pervasive threat that enables hackers to get any data in and out of a company's internal network while bypassing most firewalls.

DNS 83
article thumbnail

Cybersecurity First: #BeCyberSmart at Work and Home

Security Through Education

Build a Human Firewall. Securing your work environment requires you to create what is referred to among security professionals as a human firewall. A human firewall is made up of the defenses the target presents to the attacker during a request for information. Use company-approved/vetted devices and applications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

17 cyber insurance application questions you'll need to answer

CSO Magazine

At first, most of the cyber insurance questions involved basic computer security and merely checked to see if we had firewalls and antivirus and not much else. Answering the questions gave me an insight into the type of risks they were evaluating and the security processes that they expected us to perform.

article thumbnail

BrandPost: Protecting Cloud Assets in 5 Steps with Micro-Segmentation

CSO Magazine

Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and service be isolated to help minimize the risk of data compromise. In a traditional network, networking equipment and firewalls segment and isolate physical servers and other devices.

Firewall 109
article thumbnail

BrandPost: Simply Protecting Yourself is No Longer Enough

CSO Magazine

Firewalls, anti-virus, endpoint protection, and security awareness all form a foundation of protection against cyber threats. Really trying to understand what the risk is to you as an organization and then putting in appropriate measures to combat those. But putting these walls up is not nearly enough these days.

Firewall 127
article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

Caz-bees first took shape as a cottage industry circa 2013 to 2014 in response to a cry for help from companies reeling from new Shadow IT exposures : the risk created by early-adopter employees, quite often the CEO, insisting on using the latest smartphone and Software-as-a-Services tools, without any shred of security vetting.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

In this article we will learn how to address and effectively respond to major enterprise cybersecurity threats and provide tips to mitigate IT security risk. Be On Your Guard with the Most Treacherous Insider Roles A paramount priority when addressing the threat is to distinguish the fundamental insider risks.