In today's complex world, organizations are challenged to modernize their network while also improving their security posture to support digital transformation initiatives. Tim Roddy will talk about what is driving the need for network transformation efforts and why organizations are moving to IAM and SASE (also known as Zero Trust Edge) solutions ...
U.S. federal agencies were noted by their chief information security officers to be well-prepared for the Sept. 30 deadline on targets set in the zero trust architecture strategy of the Office of Management and Budget, FedScoop reports.
Dronepocalypse, Privacy, Microsoft, DLINK, Home Depot, Phishing, NIST, VenomRat, Josh Marpet, and more, are on this edition of the Security Weekly News.
Cybernews reports that BreachForums was claimed by widely known threat actor USDoD to be revived as "Breach Nation" less than a day after the FBI seized the infamous cybercrime site last week.
You can't just buy a full zero-trust solution. Instead, you should build a zero-trust security model by implementing various components. Here’s how to evaluate vendors of those components.
Security vendors, analysts and experts often cite several "pillars" of zero-trust security. But they don't always agree on just how many zero-trust pillars there are.
BleepingComputer reports that operations at the American Radio Relay League have been interrupted following a cyberattack against its IT systems that impacted its email and various online services.
The OWASP Top 10 gets its first update after a year, Metasploit gets its first rewrite (but it's still in Perl), PHP adds support for prepared statements, RSA Conference puts passwords on notice while patching remains hard, and more!