article thumbnail

Governance and Fighting the Curse of Complexity

CIO Business Intelligence

The road other is paved with disciplined IT and business governance. Authentication. Governance and the Process Side of Simplification So, if integrative tools are only part of the answer, what else can IT and security leaders do? Plain and simple, all IT purchases should be approved by an IT governance group. Encryption.

article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. User Authentication: Multi-Factor Authentication (MFA): Requiring users to provide multiple forms of verification (e.g.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

And it's a malware strain used specifically by the Chinese government. Chinese government actors are using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation. If these services are required, use strong passwords or Active Directory authentication.

Malware 53
article thumbnail

Safeguarding your digital ecosystem: effective strategies to detect and mitigate API abuse

CIO Business Intelligence

Strategy 1: Implement strong authentication and authorization mechanisms Enforcing robust authentication and authorization mechanisms is a fundamental step in preventing API abuse. This article explores effective strategies that empower organizations to safeguard their systems and valuable data.

article thumbnail

CIOs Look For Ways To Fool Hackers

The Accidental Successful CIO

This new method doesn’t attempt to bar intruders from getting in, like firewalls do. The way to deal with this issue is to couple a deception system with more traditional defenses like firewalls, encryption, anti-malware solutions and authentication systems. CIOs have to realize that attackers are both agile and fast.

Firewall 130
article thumbnail

How to minimize remote access cyber security threats in 2024

CIO Business Intelligence

Some of the most at-risk industries include several critical infrastructure sectors such as: Healthcare Utilities and energy Manufacturing Education State/national governments The growing trend of targeting critical infrastructure is concerning, as we’ve seen attacks like SolarWinds have devastating impacts.

Security 123
article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

Protecting data and monitoring user behavior used to be relatively simple when everyone was behind the corporate firewall. For example, data within software-as-a-service (SaaS) applications can’t be protected by the corporate virtual private network if users are outside the firewall, so access needs to be governed at the user account level.

How To 89