Network Management

Cloudflare's Zero Trust SIM is designed to secure every packet of data leaving a mobile device. After it’s installed, the ZT SIM sends network traffic from the device to Cloudflare’s cloud where its Zero Trust security policies can be applied to the data

Nearly all the top 10 universities in the United States, United Kingdom, and Australia are putting their students, faculty and staff at risk of email compromise by failing to block attackers from spoofing the schools’ email domains

Companies have a long road ahead to protect privileged identities and access, despite corporate leaders’ good intentions. Less than half of the organizations surveyed by Delinea have implemented ongoing security policies and processes for privileged access management

Scalable cloud-based solutions are widely popular among IT pros these days. The cost, convenience, and reliability of ready-to-use software as a service make this disruptive technology a favorable choice. Still, the market needs some convincing that backing up to the cloud is both a smart and safe t...

Cloud storage provider Nasuni recently announced a $60 million equity investment by new investor Sixth Street Growth. This is the fourth round of financing for Nasuni over the last five years, during which it has raised a total of $148 million. We spoke with the company's founder and CTO Andres Rodr...

The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle

Under the new Critical Infrastructure Defense Project, companies in particularly vulnerable industries -- such as hospitals and water and power utilities -- will have access to the full suite of Cloudflare's Zero Trust solution, CrowdStrike's endpoint protection and intelligence services, and Ping I...

Growing use of unified communication and collaboration tools in organizations could hurt productivity in the short term, according to a study released last week by a service assurance and cybersecurity company. In a survey commissioned by Netscout, of Westford, Mass., more than nine in 10 of the 30...

New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...

The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...

Linux Foundation Research and SODA Foundation have released study results on new data and storage trends for enterprise. The 2021 Data and Storage Trends Report reveals enterprise use of data and storage as it relates to cloud services and workloads in the era of cloud native, edge, IoT and 5G. Data...

Businesses are flocking to software-as-a-service applications as a means to improve the efficiency of their operations and the productivity of their employees, but weak control of access to cloud apps is putting the data of many organizations at risk. According to a study by DoControl, the average 1...

Disruptions to power grid systems can have devastating effects. Despite the fact that consistent electric power has been a basic human need for more than a century; more than ever, the grid faces a growing onslaught of threats. We spoke with experts in the field about the critical nature of the grid...

Hackers aren't the only ones evading security measures of many organizations. So are their remote workers. In a new report on remote workforce security, 52 percent of the U.S. IT and cybersecurity professionals surveyed revealed they experienced remote workers finding workarounds to their organizati...

E-Commerce Times Channels