Remove Authentication Remove Internet Remove Security Remove Symantec
article thumbnail

Why you need a strong authentication platform

Network World

Common challenges Image by Pexels As the security landscape is changing, so are the business challenges that organizations are facing. According to Symantec ’s annual Internet Security Threat Report , up to 80 percent of breaches could be eliminated with strong authentication.

article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

However, some concerns about cloud security risks appeared early in the industry and are still relevant today. All information traveling between your company network and the servers of your cloud provider exists, if only briefly at times, on the internet, where it could possibly be captured by malicious computers. Data Breaches.

Cloud 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fed Tech Roundup August 27

CTOvision

Northrop Grumman M5 Network Security Wins Eureka Prize for Outstanding Science for Safeguarding Australia. Symantec takes on the Internet of unsecured things - GCN.com. USPS Official: First Priority with Internet of Things is Cost Cutting - Nextgov. CSC wins $109M FAA cloud contract. FCW.com.

Symantec 150
article thumbnail

The future of trust—no more playing catch up

CIO Business Intelligence

By Eric Chien, Director of Security Response, Symantec Enterprise Division, Broadcom This is a continuation of Broadcom’s blog series: 2023 Tech Trends That Transform IT. There was little time to consider and mitigate against all the new security implications. There was no time. They can no longer play catch up.

Trends 52
article thumbnail

A Question of Identity: The Evolution of Identity & Access Management

SecureWorld News

Identity as the new digital perimeter is the cornerstone for assuring secure "Anytime, Anywhere, Authorized" access to protect enterprise security and privacy. Processes enable Identity to power people-centric security. Technology: Technology is the foundation for an IAM program delivery within a layered security architecture.

article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. More tools require extra work to manage but don’t guarantee more security.

article thumbnail

The Sony Hack in Context

CTOvision

The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. In connection with these losses the recently retired Director of the National Security Agency has stated, "In fact, in my opinion, it''s the greatest transfer of wealth in history,".