Remove Encryption Remove InfoSec Remove Password Management Remove VPN
article thumbnail

Keeper Security Acquires Glyptodon to Provide Zero-Trust Remote Access for IT Admins, SREs and DevOps Teams

CyberSecurity Insiders

It includes integration of Glyptodon Enterprise into Keeper Security’s zero-trust and zero-knowledge security and encryption architecture, resulting in a highly-secure, agentless remote access platform, without the need of a virtual private network (VPN). “In Keeper is SOC-2, FIPS 140-2 and ISO 27001 Certified.

article thumbnail

Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices

Thales Cloud Protection & Licensing

That includes setting up a VPN through which remote employees can access work assets. Per Symantec , they should specifically require passwords that contain at least 16 characters comprised of upper- and lowercase letters, numbers and symbols. Of course, passwords don’t provide absolute protection for business accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Blocking legitimate users is part of that problem, blocking users wanting to protect their traffic with a VPN is another: This has been there for the past year now. They also blacklist vpn IP addresses. This is poor form as it can break tools that encourage good security practices such as password managers.

Hacking 279
article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

It's a process of protecting critical information through encryption and being aware of the potential for eavesdropping on conversations. Vamosi: Within InfoSec there's an informal use of AppSec as well. And I use a VPN that doesn't log my websites. Don't use familiar passwords seriously. You need a VPN.

Hacking 52