Addressing the Challenges of Securing Hybrid Cloud Access: What You Need to Know

Author(s):

Joseph Carson, Chief Security Scientist & Advisory CISO, Delinea

PAM as a service is a robust solution that can address the challenges of hybrid cloud security.

For a growing number of companies, a blend of public cloud services, private clouds, and on-premises infrastructure offer the best solution to the benefits and limitations of each. Cloud adoption is growing, and the past two years have shown a major increase in the use of cloud services. In addition, emerging technologies like edge computing … Read more

Single Sign-On: Balancing Power and Responsibility

Author(s):

François Amigorena, Founder and CEO, IS Decisions

Single Sign-On: Balancing Power and Responsibility

Single Sign-On (SSO) is a powerful productivity tool for organizations today. Facilitating access to on-premises and cloud-based applications, it dramatically simplifies the user experience. With SSO, users simply logon once, open a web browser or portal application, and open any and every application provisioned for them by IT.  But as Peter Parker’s Uncle Ben taught us “with … Read more

Why it’s Time to Adopt a Risk-Based Approach to AppSec

Author(s):

Vinugayathri Chinnasamy, Senior Content Writer, Indusface

Risk-based AppSec

Today, AppSec (Application Security) is not only about compliance with regulatory frameworks. In the face of newer threats, a growing attack surface, and the lack of AppSec talent, legacy WAF solutions and traditional security approaches constantly try to catch up but unsuccessfully. And this is where the risk-based approach to security comes in.  This article … Read more

Digital ID Proofing: Testing…Now Complete

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Digital ID Proofing: Testing...Now Complete

Digital Identity (ID) Proofing—also known as digital identity authentication or digital ID verification using computer technology—is an increasingly important aspect of online security.  Even if you’re doing business only online, you still need to be sure that your customers are who they say they are and that the information you collect about them is accurate.  … Read more

4 Actions to Improve DDoS Protection

Author(s):

Vinugayathri Chinnasamy, Senior Content Writer, Indusface

DDoS Protection

Distributed Denial of Service (DDoS) attacks are increasing in the sheer volume and size of attacks and their impact, severity, and sophistication. Therefore, DDoS attack protection is also becoming more complex and challenging. Simply using a traditional Web Application Firewall (WAF) or increasing the server bandwidth will not protect you from a DDoS attack.  Even … Read more

The Importance of Cybersecurity and DDoS Protection in Finance

Author(s):

Marc Wilczek, COO, Link11

DDoS Protection & Financial Security

The financial services sector is one of the biggest industries at risk, particularly after the COVID-19 pandemic and the boosted digitalization of business and personal finances. Banking is no longer a brick-and-mortar business; banking is digital, it’s mobile – 24/7, around the globe, which provides cybercriminals with more attack surfaces. Lately, we have seen cybercriminals … Read more

How to Build a Cybersecurity Awareness Program from the Ground Up

Author(s):

Andrew Obadiaru, CISO, Cobalt

How to Build a Cybersecurity Awareness Program from the Ground Up

Amid an ever-evolving cyber threat landscape, CISOs must anticipate the strategies that will be needed to keep their organizations safe. Of critical importance, they need to ensure their colleagues can spot – and report – security scams and other suspicious behaviors easily. Cybersecurity training ensures CISOs’ first line of defense – their people – are … Read more

7 Things to Know About CMMC Compliance

Author(s):

Derek White, Director of Business Development, Cuick trac

CMMC Compliance

The Cybersecurity Maturity Model Certification (CMMC) has been discussed and debated at length. With so many different opinions, it’s challenging to know what you should be doing to comply with its guidelines and requirements. This CMMC compliance guide will provide an overview of the most critical aspects of CMMC and then offer some practical guidance … Read more

How Extended Security Posture Management Help Cybersecurity Teams

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

Extended Security Posture Management

A career in cybersecurity is dynamic. Every day is different, and the attack surface is always changing. Also, learning about cybersecurity only results in the realization of how much room for progress and the need for further education there really is. The role cybersecurity teams have within organizations is hugely important. They protect everything that … Read more

Top 5 Risks of Using Free VPNs

Author(s):

Paul Cawthon, Content Director, Incogniton

Top 5 Risks of Using Free VPNs

VPNs are not always as safe as we think they are, especially the free ones. Their promise of private browsing sessions is subject to the service provider’s integrity, and for many who provide the service free, you should not depend on it. VPN stands for Virtual Private Network. They have been around since the early … Read more