Bypassing of security during the successful heist of the Bellagio vault came down to identity and perimeter defenses, the main vulnerabilities of network security—and exactly the weaknesses that zero trust methodology fortifies for organizations.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
With specific guidance from an amended HITECH Act to include a comprehensive cyber policy, the healthcare industry will better secure patients’ data.
Posing as Quanta Computer, Lithuanian took $100 million from Google and Facebook through a phishing scam involving email spoofing and forged paperwork. How can companies protect themselves against business email compromise?
Technologies like AI and Machine Learning can give companies a competitive lead in terms of information security and data safety. How can these technologies support cybersecurity?
New standards are requiring OEMs and Tier-1s to implement cybersecurity solutions that are comprehensive and can operate throughout the lifecycle of the vehicle.
Attackers who are blocked by strong defenses in other areas, are exploiting exposures from mismanaged machine identities to exploit the trust these systems are designed for.
Recently, we examined some of the challenges that companies face in terms of the evolving privacy and data protection landscape - and how these challenges may require a whole new breed of information security professional. In this second part of the series we unpack the argument for a new role combining Chief Security Officer and Chief Privacy Officer in a rapidly evolving regulatory and threat rich environment. We also chat with Chief Security and Privacy Officer (CSPO) at a Fortune 500 company to get his take on the subject.
Global cyber war no longer seems impossible with state-sponsored cyber attacks mounting around the world and possibility of China, Iran and Russian uniting to go against U.S. in the cyber domain.
Beyond the challenges around risk and uncertainty, can bug bounties really deliver on their promise? Even as crowdsourced security testing continues to gain acceptance, what’s important is designing the right model to increase efficiency and avoid diminishing marginal returns.
To achieve the full promise of cloud and digital transformation, enterprises must transform not just their networking but also security architectures. SASE is moving organisations in this new direction.