IT News - Security
2020 Jun 28
#93272
83% Of Global 2000 Enterprises Have Not Adopted Basic Domain Security Practices
HelpNet Security, June 17th, 2020

"According to the report, 83% of Global 2000 organizations have not adopted basic domain security measures such as registry lock, which puts them at risk for domain name hijacking.

The report indicates a wide industry disparity in domain security maturity with information technology and media and entertainment industries more likely to embrace available security controls, while industries such as materials and real estate trail behind..." - HelpNet Security
(Get More Information . .)

2020 Jun 28
#93273
What Will Cybersecurity's 'New Normal' Look Like?
Dark Reading, June 19th, 2020

"From the way restaurants operate to how sports are played, many people expect life to operate a whole lot differently in the pandemic's aftermath. The big question for us, though, is what will the new normal be for those in cybersecurity?" asks Curtis Franklin in Dark Reading.

"I think it's worth pointing out that there's only two ways security changes: a fundamental change in the business environment - because security is there for business - or if the threat changes," says Bryson Bort, founder of SCYTHE and GRIMM, and co-founder of the ICS Village. "On the first point, clearly business will be different going forward. I think we finally crossed a Rubicon for remote workers, which changes the threat surface."
(Get More Information . .)

2020 Jun 28
#93274
Because IT Security And The C-Suite Are Misaligned, Digital Transformation Increases Cyber Risk
HelpNet Security, June 18th, 2020

"Today, these vulnerabilities are only exacerbated by misalignment between IT security professionals and the C-suite.

The research by CyberGRX and Ponemon Institute surveyed 900 IT security professionals and C-level executives covering financial, healthcare, industrial, public sector and retail industries..." - HelpNet Security
(Get More Information . .)

2020 Jun 28
#93275
4 Ways Employee Home Networks And Smart Devices Change Your Threat Model
CSO Online, June 16th, 2020

"Many employees at businesses worldwide have been forced to work from home because of COVID-19 related social distancing mandates," writes Jaikumar Vijayan in CSO Online.

"The security of employee home networks, and of the devices connected to them, are becoming increasingly important considerations for organizations that need to continue to support a large remote workforce for the foreseeable future..."
(Get More Information . .)

2020 Jun 28
#93276
Cloud Security Alliance Offers Tips To Protect Telehealth Data
Dark Reading, June 19th, 2020

"The COVID-19 pandemic has pushed healthcare organizations to make telehealth a top priority," opines Kelly Sheridan in Dark Reading.

"As they do, they're forced to confront privacy concerns related to information access, usage, and alteration, as well as the security of public cloud services where health data is stored.

As the Cloud Security Alliance (CSA) explains in a new report on protection of health data, "telemedicine" and "telehealth" should not be used interchangeably. The former refers to the clinical diagnosis and monitoring by technology; the latter has a broader definition..."
(Get More Information . .)

2020 Jun 28
#93277
6 Key Identity And Access Management Benefits
SearchSecurity, June 17th, 2020

"Years ago, when users required access to a specific system, application or other corporate resource, they were provided a username and password tied to the access level they needed" writes Sharon Shea and Andrew Froehlich in SearchSecurity.

"While this was a viable option when the number of IT services was small, it didn't take long before the number of accounts a user had to manage reached a dozen or more. To keep track of all these account usernames and passwords, many end users resorted to writing down their account information on sticky notes that they stuck to their monitors for all to see. Understandably, this type of password management is a big no-no by anyone's security standards. Thus, IT needed a way to better manage the growing number of user accounts. The answer was identity and access management (IAM)..."
(Get More Information . .)

See all archived IT News - Security articles See all articles from this issue