IT News - Security
2021 Feb 21
#101058
You've Got Cloud Security All Wrong: Managing Identity In A Cloud World
Dark Reading, February 12th, 2021

"As organizations prioritize digital transformation," writes David Mahdi in Dark Reading, "they are moving services to the cloud at a rapid clip. Yet when making this shift, many companies fail to make the necessary updates to their security programs and solutions to protect the new cloud perimeter. Rather than redesigning their security infrastructure for the cloud, many organizations are simply wrapping the cloud around their legacy technologies, relying on legacy network security solutions to protect their data..."
(Get More Information . .)

2021 Feb 21
#101059
Why Security Teams Are Burning Themselves Out
eWeek, February 9th, 2021

"Recently The Wall Street Journal published an article titled 'Cyber Chiefs Watch Their People for Burnout as Pandemic Rolls On,' which posited that IT security teams are burning out even more quickly than before the COVID-19 pandemic. With IT security teams supporting a vastly new remote workforce - and an even wider attack surface - that increases sophisticated cyberattack attempts by adversaries, the scales have tipped even more but not in the security operations center (SOC) teams' favor..." - eWeek
(Get More Information . .)

2021 Feb 21
#101060
3 Keys To An Effective Zero Trust Access Strategy
CSO Online, February 11th, 2021

Peter Newton writes in CSO Online, "The reality is that no network is an island, and as businesses become more digital, networks inevitably become more complicated and dispersed. Today's networks now have many 'edges,' so it's much harder than it used to be to create a single defensible boundary. In the face of these changes, the traditional network perimeter is dissolving, and it's far more difficult to tell who and what can be trusted.

To respond to increasing threats, best practices now stipulate a "trust no one, trust nothing" attitude toward network access. Protecting the network with this zero-trust access (ZTA) approach means that all users, all devices, and all web applications from the cloud must be trusted, authenticated, and have the correct amount of access privilege (and no more.)..."
(Get More Information . .)

See all archived IT News - Security articles See all articles from this issue