Geek-Guy.com

Tag: zero trust

Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty

Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers?   Difficulties and Positive Changes   The recent ISACA State of Cybersecurity 2022 survey provides some key markers: Unfilled positions are on the rise (not good) Existing teams are understaffed (not good) Budgets are (finally) increasing (good) University degree mandates […]

The post Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty appeared first on Security Intelligence.

One Size Does Not Fit All Organizations

Often, when you read about cybersecurity, the advice appears to be ‘one size fits all’. People recommend the same things, regardless of if the business is two people in a home office or a global group with 100,000 employees. In some ways, the underlying concepts of cybersecurity are the same for all companies. However, the […]

The post One Size Does Not Fit All Organizations appeared first on Security Intelligence.

BlackBerry launches zero trust network access solution

This week BlackBerry unveiled CylanceGATEWAY, an AI-driven zero-trust network access (ZTNA) as-a-service solution designed to provide businesses of all sizes with a contextual correlation of network and device telemetry combined with continuous authentication to limit access to trusted, authenticated, and known users and devices.  The company said that CylanceGATEWAY works alongside CylancePROTECT and CylancePERSONA to […]

The post BlackBerry launches zero trust network access solution first appeared on IT World Canada.

Why Phishing Is Still the Top Attack Method

Attackers are known to pore over a company’s website and social channels. Perhaps they spot a mention of an upcoming charity event. Who runs the charity? What does their email signature look like? What’s the color and size of the charity’s logo?    This kind of information is priceless to attackers. From there, attackers can craft […]

The post Why Phishing Is Still the Top Attack Method appeared first on Security Intelligence.

Five Steps to Prepare Data for a Zero-Trust Security Model

The outmoding of traditional network security Traditional network security was based on the concept of a guarded network perimeter, which is difficult to access from the outside but implicitly trusts everyone on the inside. The problem with this approach is that once an attacker has access to the network, they are free to move laterally […]

The post Five Steps to Prepare Data for a Zero-Trust Security Model appeared first on Blog.