While smart card standards remain prevalent throughout the federal government, the need to move beyond PIV and CAC for authentication has never been greater, especially with the proliferation of mobile devices.
Additionally, in Zero Trust environments that agencies are building, the diversity and number of...
Security operations focus an organization’s efforts around threat prevention, detection, and response. This then depends upon effective data collection, processing, and analysis, followed by data-driven decision making.
While organizations have years of experience in these areas, security operations processes and...
While the concept of Zero Trust has been around for a while, and in many organizations Zero Trust initiatives are well underway, it still means different things to different people. There may be many roads to Zero Trust cutting across the network, identity, and access control, and the array of definitions or ways to...
Healthcare organizations are an ongoing criminal
target due to the rich data they keep.
With the extensive, rapid shift of medical services to
the digital world and vast sets of health data gathered
amid the pandemic, criminals will likely seize this
opportunity to infiltrate networks and hack...
The United States federal government relies heavily on information technology (IT) to drive efficiencies and increase
public engagement. However, an increase in cyberattacks and data breaches impacting government operations creates a
storm of risks and challenges.
Download this whitepaper for more information...
Education is evolving. While the virtual classroom, alongside education technology (EdTech) tools and practices aimed
at enhancing learning, is not a new model in the university setting, K-12 institutions face daily challenges to verify access
while safely and securely shifting to 100% virtual and hybrid learning...
Multi-factor authentication (MFA) necessitates the user to provide two or more verification factors to gain access to a
resource such as an application, an online account, or a virtual private network (VPN). It is a core component of a strong
identity and access management policy.
Download this whitepaper for...
During the past year-plus of digital transformation, many enterprises have not just migrated to the cloud but to hybrid cloud environments. David Hill of Veeam says two security measures - data portability and protection - are often overlooked.
In this eBook with Information Security Media Group, David Hill...
Enterprises across industry segments are moving IT workloads and functions to the cloud, frequently ahead of any strategy or consistent capability to secure sensitive data. The advantages of cloud migration, such as scale, agility, and consumption-based pricing, are compelling.
This white paper describes the...
Allegiant characterizes itself as more of an e-commerce company than an airline, because 94% of its revenue comes through the website. As such, they needed another level of data security.
Download this case study to learn how Allegiant changed its security practices by:
Deploying Voltage SecureData with Secure...
Some 3,813 breaches were reported in the first half of 2019 alone, amounting to the exposure of over 4.1 billion records, a year-on-year increase of 54% and 52% respectively.The rise in data breach volumes is undoubtedly due in part to escalating threat activity.
The challenge for organizations is in securing data...
Third party risk management process should be part of your overall cybersecurity program. Having the right processes in place will help you identify risk in your third parties and put a remediation plan in place to prevent security incidents before they happen. But implementing a vendor security program is often...
Security teams and risk professionals consistently ensure the effectiveness of their cyber defense mechanism. The ongoing pandemic has intensified their challenges as they now have to ensure cyber resilience for their organizations in a hostile open environment. As organizations looked to quickly adjust to the new...
Businesses that don’t make efforts to modernize their approach to vendor security will play a constant game of catch up—whether they’re responding to assessments or evaluating vendors. The good thing for you is modernizing your vendor security program isn’t as hard as you think. Following the simple steps...
Not every company has a mission as bold as to help build a more reliable Internet—but Gremlin does. And for Skyler Sampson, Senior Security Architect at Gremlin, vendor security is a critical function of achieving that mission. “We target a lot of financial customers where downtime is critical,” said Skyler,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.