Remove Authentication Remove CISO Remove VPN
article thumbnail

Bridging the Security Gaps in Healthcare With Trusted Access

Duo's Security Blog

This report Bridging Healthcare Security Gaps: Better Authentication Improves Controls aims to bring clarity and solutions to these security gaps. Three things keep healthcare CISOs up at night, first, the industry is highly targeted by cyber criminals. A proactive approach can help healthcare organizations (HCOs) avoid these problems.

article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

Legacy, perimeter-based architectures like traditional virtual private networks (VPNs) and firewalls are not only expanding the attack surface, but also exacerbating challenges for organizations that are up against increasingly sophisticated threats and cloud-first demands. Do they have sufficient defense in depth and security governance?

CISO 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

We find many CISOs spend their time explaining what threats matter and why, as opposed to why cybersecurity matters in the first place,” he says. Within hours after a public disclosure about vulnerabilities that needed patching in enterprise-grade VPN, threat actors shifted into high gear. That’s the ‘cheat code’ for CISO success.

CISO 185
article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

RDP intrusions are typically the result of two attacker methods: brute force authentication attempts or a meddler-in-the-middle (MITM) attack. Remote desktop software’s sensitive influence over other devices means identity and access management (IAM), password security , and multi-factor authentication are critical for risk management.

VPN 120
article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. We’re able to roll that out not only for our desktop computers and for laptops and for VPN clients, but even for mobile devices,” said Sanders. “So

CISO 82
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. Since then, teams have had years to adjust to this new reality, yet the attackers have as well.

article thumbnail

The four cybersecurity trends to watch in 2023

CyberSecurity Insiders

By: Matt Lindley, COO and CISO of NINJIO. When employees aren’t in the office, they’re liable to engage in risky behaviors such as using unsecured WiFi without a VPN, leaving work devices unlocked in public places, and clicking on malicious emails. Companies should also provide clear channels for reporting suspicious incidents.