The year has just begun and as with previous years, many worrying strains of destructive malware have yet again been detected. Unlike ransomware, where you at least have a chance of recovering your data after paying the ransom, the new destructive techniques pose a very real and serious threat to businesses. The recently reported HermeticWiper…
Archives
-
Identity – Don’t Forget About the Device
The word “identity” has always made us think of a person’s identity. However, over the past 20 years the meaning of the term has evolved subtly. This evolution focused mainly on the shift from a human identity to privileged identities and then to generic accounts and application-based accounts. But the last five years or so…
-
Going back to Zero: A Primer on Zero Trust
We are here to talk about going back to Zero!!! Today’s enterprises are home to hundreds of applications that are critical to their core business. However, a paradigm shift in the landscape of Information Technology due to cloud adoption, remote workforce, and mobility has forced organizations to rethink their security approach to keep bad actors…
-
Does the Presidential Executive Order Reinforce Zero Trust and Identity Defined Security?
In May, US President Joe Biden’s executive order on cybersecurity marked the launch of an ambitious, in-depth approach to improving the digital defenses of the federal government in the wake of multiple sophisticated attacks on the public and private sector. Biden’s order covered significant ground, including strengthening software supply chain security and implementing data encryption. But what…