article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. User Authentication: Multi-Factor Authentication (MFA): Requiring users to provide multiple forms of verification (e.g.,

article thumbnail

Agencies Warn of Pro-Russia Hackers Targeting OT Control Systems

SecureWorld News

Some key examples of confirmed activity from early 2024 include pro-Russia groups remotely accessing HMIs at water treatment facilities to max out pump settings, disable alarms, and change passwords to lock out operators—leading to minor spills in some cases. Mandate multifactor authentication for privileged users.

System 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CIOs Look For Ways To Fool Hackers

The Accidental Successful CIO

An example of this kind of operation is technology that can deploy an array of decoys and booby traps throughout a company’s networks. This new method doesn’t attempt to bar intruders from getting in, like firewalls do. The goal of solutions like this is to keep attackers out of your networks in the first place.

Firewall 130
article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

For example, being able to move from slot machine to slot machine using a digital wallet stored on your phone. As learned from recent cyberattacks, user education has become a critical component to protecting against these threats as well. What emerging technologies are you most excited about?

article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

Protecting data and monitoring user behavior used to be relatively simple when everyone was behind the corporate firewall. For example, more people now need access to sensitive business data while working from home, on public computers, and via their mobile devices. Lock the front door. You practically need a Ph.D.

How To 81
article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

These attacks can come from malicious instructions, social engineering, or authentication attacks, as well as heavy network traffic. Policies Many different kinds of policies can be implemented to work against attacks, but it's important to have some fundamental principles in place to set an overall example throughout the company.

article thumbnail

Effectively Manage All Endpoints, No Matter Where They Are Located

CIO Business Intelligence

However, employees working outside the corporate firewall and other network protections pose some big security challenges, especially for large enterprises. For example, during the first weeks of the COVID-19 pandemic, cyber insurers had significant concerns about the security risks incurred with so many employees suddenly working from home.