article thumbnail

Are You Guilty of These 8 Network-Security Bad Practices?

Threatpost

Tony Lauro, director of Security Technology & Strategy at Akamai, discusses VPNs, RDP, flat networks, BYOD and other network-security bugbears.

article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

Market Leader in Managed Security Service Provider (MSSP). HG Managed Security Services can be consumed independently or packaged into a complete Security-as-a-Service offering. HG Security Engineering . HG Mana ged Detection & Response (MDR) . Identity Managed Services. .

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Purdue University’s CERIAS 2021 Security Symposium – Yoon Auh ‘s ‘NUTS: The Beta Demo, NUTS Technologies Inc.’

Security Boulevard

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel. ’ appeared first on Security Boulevard.

article thumbnail

Supply chain attacks are closing in on MSPs

Webroot

Second-stage infections were then pushed against these targets, plus some of the world’s most influential technology vendors. The infosec researcher Matt Tait, who spoke at this year’s Black Hat on the topic of supply chain attacks, called the Codecov compromise an instance of high-volume disruption based on indiscriminate targeting.

InfoSec 131
article thumbnail

Zero-Trust Network Access: Why so Many Teams Get it Wrong

Security Boulevard

Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. The post Zero-Trust Network Access: Why so Many Teams Get it Wrong appeared first on Security Boulevard. Why are so many organizations getting it wrong?

article thumbnail

Cyber CEO: 3 Key Components for Resilient Third Party Risk Management

Herjavec Group

The recent SolarWinds breach was a tough reminder that technological advancement will always carry inherent risks. Before the pandemic, the typical network security perimeter made it easy to differentiate between our teams and external groups. Third-party risk is a hot topic in the world of cybersecurity. To Your Success , .

Risk 52
article thumbnail

As SolarWinds spooks tech firms into rechecking code, some won’t like what they find

SC Magazine

If or when more attacks are uncovered, end-user organizations will need to apply the lessons learned from SolarWinds and prepare to take swift and decisive action, infosec experts agreed in a series of interviews with SC Media.

InfoSec 97