article thumbnail

Governance and Fighting the Curse of Complexity

CIO Business Intelligence

The boulder is made from complex infrastructure, network connections, data stores, and devices. The road other is paved with disciplined IT and business governance. Authentication. Governance and the Process Side of Simplification So, if integrative tools are only part of the answer, what else can IT and security leaders do?

article thumbnail

Managing the whole lifecycle for human and machine authentication

CIO Business Intelligence

In my last column for CIO.com , I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. . FIDO as an industry initiative was set up a decade ago to standardize the need for strong authentication/password technologies. Well, yes, but there is more that tech pros can do.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

Network News: CenturyLink, Cisco, Juniper

Data Center Knowledge

CenturyLink and Cisco help power ultra-fast 100 Gbps networks, and Juniper and Thursby Software partner for Government secure authentication solution. Cisco Networking centurylink juniper russia'

Network 182
article thumbnail

Government cybersecurity agency warns of Windows Server exploit

Network World

The federal government's Cybersecurity and Infrastructure Security Agency (CISA) has issued a rare emergency directive to federal government agencies to roll out a Windows Server patch within days, an indication of the severity of the exploit. It has been named "Zerologon" because of how it works.

article thumbnail

Zero Trust: Understanding the US government’s requirements for enhanced cybersecurity

CIO Business Intelligence

The US government has been at the forefront of promoting this approach, with a series of guidelines and requirements that companies must adhere to. In this blog, I will explore some of the current requirements for companies to implement Zero Trust as outlined by the US government. What is Zero Trust?

article thumbnail

White House instructs government agencies to beef up cybersecurity, adopt ‘zero trust’ in new memo

The Verge

The White House released a new cybersecurity strategy Wednesday aimed at reducing the risk of cyberattacks against government infrastructure. This zero trust strategy is about ensuring the Federal Government leads by example, and it marks another key milestone in our efforts to repel attacks from those who would do the United States harm.”.