-
BrandPost: CWPP: How to Secure Cloud-Native Applications Built with Containers
PRIVACY PRIVACY The transition into CWPP Agility and flexibility were key directives in the development of new technology, which is why on-premise assets soon transitioned into virtual machines, which further transformed into compact and swift containers. Modern enterprise network environments are increasingly transforming to be cloud-based, where both applications and data storage are hosted in…
-
BrandPost: Protecting Cloud Assets in 5 Steps with Micro-Segmentation
PRIVACY PRIVACY Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and service be isolated to help minimize the risk of data compromise. In a traditional network, networking equipment and firewalls segment and isolate physical servers and other devices. However,…
-
BrandPost: SD-WAN and Cybersecurity: Two Sides of the Same Coin
PRIVACY PRIVACY Software-defined wide area networking, or SD-WAN, is the next frontier for the network edge. Multiple analysts report that the SD-WAN market is in the billions of dollars, with an annual growth rate in the 25% to 35% range. Managed service providers and carriers globally are increasingly deploying managed SD-WAN services to reach new…
-
BrandPost: ZTNA: The New Way to Secure Remote Workers and the Cloud
PRIVACY PRIVACY Digital transformation, or DX, is driving enterprises worldwide to adapt their network and security strategies. Two key trends in particular have accelerated due to the pandemic: the adoption of cloud infrastructures, and the growth of a distributed workforce. Together, these trends have forced a restructuring of both networking and security. Now, enterprises need…
-
Groundbreaking Cybersecurity Book Published
PRIVACY PRIVACY First cybersecurity book written exclusively by women and non-binary experts published Read More
-
Keeper Connection Manager : Privileged access to remote infrastructure with zero-trust and zero-knowledge security
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Keeper Security. Thanks to the great team there for their support! The mass migration to distributed work presented IT and DevOps teams with new challenges as they were forced to perform infrastructure monitoring and management remotely. IT and DevOps personnel needed…
-
New attack surface management product takes full-stack aim at software supply chain threats
PRIVACY PRIVACY Software supply chains have become a tasty target for adversaries fueled by successful, high-profile attacks on companies like Solarwinds and Kaseya and open-source offerings like Log4j. Now a software applications security company seeks to address the problem with what it’s saying is the first attack surface management (ASM) product to address threats across…
-
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
PRIVACY PRIVACY Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make sure our passwords are words or phrases that we can easily remember, right? While this might be the most convenient option, there are more secure ways to digitally lock up your most sensitive…
-
SIM Fraud Solution Sparks Privacy Fears
PRIVACY PRIVACY Concerns raised over South Africa’s proposal to tie people’s biometric data to their SIM cards Read More
-
Instagram Hack Results in $1 Million Loss in NFTs
PRIVACY PRIVACY Imagine – your favorite brand on Instagram just announced a giveaway. You’ll receive a free gift! All you have to do is provide your credit card information. Sounds easy, right? This is a brand you’ve followed and trusted for a while now. You’ve engaged with them and even purchased some of their items.…