article thumbnail

Effectively Manage All Endpoints, No Matter Where They Are Located

CIO Business Intelligence

However, employees working outside the corporate firewall and other network protections pose some big security challenges, especially for large enterprises. CIOs and CSOs still have to ensure that employees outside of the corporate firewall can do their work securely. The need for a more permanent solution.

article thumbnail

The Three Tenets of Zero Trust Security

SecureWorld News

Before early 2020, people had a somewhat different view of cybersecurity than they do today. Back then, much of the cybersecurity discussion might have been around strengthening passwords, updating anti-virus software, and maybe deploying the latest firewalls to protect the enterprise perimeter.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FBI Warns of ‘More Destructive’ DDoS Attacks

SecureWorld News

In February 2020, UK security researchers discovered a vulnerability in free, open source, automation servers that would allow cybercriminals to amplify a Distributed Denial of Service attack by 100. The February 2020 incident was the straw that finally broke the camel's back. FBI warning addresses DDoS amplification attacks.

Network 53
article thumbnail

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Jason Eckert provides an introduction to using WireGuard for VPN connectivity.

Linux 60
article thumbnail

The Power of Depth of Defense for Cybersecurity

SecureWorld News

Real-life examples of depth of defense Network Perimeter: Organizations often deploy firewalls, intrusion detection systems, and network monitoring tools at the network perimeter to prevent unauthorized access. Two-Factor Authentication (2FA): Implementing 2FA adds an extra layer of authentication beyond traditional usernames and passwords.

article thumbnail

Death of the VPN: A Security Eulogy

SecureWorld News

This is accomplished using a three-layered approach involving tunneling, authentication and encryption. The final nail in the coffin of VPN came in early 2020. Zero Trust, as implied by the name, not only requires robust authentication but also segments users with granular access to specific apps.

Security 130
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

In 2011, researcher Ang Cui showed how updates to common laser printers were not signed or otherwise authenticated, meaning that you might think you’re doing the right thing by applying an update when in reality you might be unintentionally installing malware. Supply chain compromises have been talked about for a few years now.