article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. User Authentication: Multi-Factor Authentication (MFA): Requiring users to provide multiple forms of verification (e.g.,

article thumbnail

CIOs Look For Ways To Fool Hackers

The Accidental Successful CIO

An example of this kind of operation is technology that can deploy an array of decoys and booby traps throughout a company’s networks. This new method doesn’t attempt to bar intruders from getting in, like firewalls do. The goal of solutions like this is to keep attackers out of your networks in the first place.

Firewall 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

Protecting data and monitoring user behavior used to be relatively simple when everyone was behind the corporate firewall. For example, more people now need access to sensitive business data while working from home, on public computers, and via their mobile devices. Lock the front door. You practically need a Ph.D.

How To 98
article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

For example, being able to move from slot machine to slot machine using a digital wallet stored on your phone. As learned from recent cyberattacks, user education has become a critical component to protecting against these threats as well. What emerging technologies are you most excited about?

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern. All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available.

Financial 105
article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

These attacks can come from malicious instructions, social engineering, or authentication attacks, as well as heavy network traffic. Policies Many different kinds of policies can be implemented to work against attacks, but it's important to have some fundamental principles in place to set an overall example throughout the company.

article thumbnail

Effectively Manage All Endpoints, No Matter Where They Are Located

CIO Business Intelligence

However, employees working outside the corporate firewall and other network protections pose some big security challenges, especially for large enterprises. For example, during the first weeks of the COVID-19 pandemic, cyber insurers had significant concerns about the security risks incurred with so many employees suddenly working from home.