trust
-
Blog
NGFW and Zero Trust Integration for Stronger Security
Businesses are constantly seeking innovative ways to protect their digital assets from increasingly sophisticated threats. Two of the most prominent strategies in modern cybersecurity are next-generation firewalls (NGFWs) and the zero-trust security model. While NGFWs have been a cornerstone of network security for years, the Zero Trust model represents a paradigm shift in how organizations approach security, emphasizing the principle…
Read More » -
Blog
Microsoft Trust Signing service abused to code-sign malware
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. Threat actors have long sought after code-signing certificates as they can be used to sign malware to appear like they are from a legitimate company. Signed malware also has the advantage of potentially bypassing security filters that would normally block unsigned executables, or at least treat…
Read More » -
Blog
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
With the number of IoT devices expected to skyrocket in the next four years, researchers have called on more robust cybersecurity protections to counter a wave of rising threats. In a new study by Juniper Research, the number of devices is set to hit 28 billion globally by 2028. However, amidst this sharp growth, the increasing complexity of IoT networks…
Read More » -
Blog
Google’s latest genAI shift is a reminder to IT leaders — never trust vendor policy – Computerworld
If they add a clause to every RFP that they will only work with model-makers that agree to not do X, Y, or Z, that will get a lot of attention. The contract would have to be realistic, though. It might say, for instance, “If the model-maker later chooses to accept payments for the above-described prohibited acts, they must reimburse…
Read More » -
Blog
How the channel can simplify cybersecurity to build trust and agility for SMBs
In the modern digital age, small and medium-sized businesses (SMBs) are prioritizing cybersecurity and data protection to enhance their digital agility, according to research. Despite being stretched thin with daily operations, these businesses recognize the growing importance of cybersecurity, especially as they integrate advanced technologies like AI. However, navigating the complexities of cybersecurity remains a challenge. This presents an opportunity…
Read More » -
Blog
US eyes ‘Cyber Trust Mark’ to lock down IoT frailties, but experts worry it doesn’t go far enough
The White House has launched a new cybersecurity label for internet-connected devices in a bid to help end-users quickly assess the security credentials of IoT systems. The program will mean smart devices sold in the US can be given the ‘Cyber Trust Mark’ to indicate vendors have implemented essential security measures when developing their products. “The U.S. Cyber Trust Mark…
Read More » -
Blog
US to Launch Cyber Trust Mark to Label Secure Smart Devices
The U.S. government is set to introduce a seal of approval to help consumers identify secure internet-connected devices, the White House announced in a press release on Jan. 7. The U.S. Cyber Trust Mark will certify devices that meet certain security standards. Following the initiative’s first announcement in July 2023, the Federal Communications Commission provided details on Tuesday about how…
Read More » -
Blog
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security tools
Cognizant has announced an expansion of its existing partnership with Zscaler in a move designed to help customers simplify their security with AI-enabled zero trust cloud security solutions. The freshly extended collaboration will see the pair offer AI-powered coordinated solutions and services to reduce organizations’ overall security complexity while maximizing security posture. In an announcement, Cognizant CEO Ravi Kumar S…
Read More » -
Blog
Alder Hey Children’s NHS Foundation Trust investigating data breach after ransomware gang claims attack
Last night, ransomware gang INC added Alder Hey Children’s NHS Foundation Trust to its data leak site. It alleges to have stolen patient records, donor reports, and procurement data from 2018 to 2024. Comparitech contacted the children’s hospital in Liverpool for more information and the Trust subsequently released a statement. In it, it confirmed it was aware of the threats…
Read More » -
Blog
Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations
In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect their organizations. The “MITRE Engenuity ATT&CK Evaluations: Enterprise” stand out as an essential resource for cybersecurity decision makers to navigate this challenge. Unlike other independent assessments, MITRE ATT&CK Evaluations simulate real-world threats to assess how competing cybersecurity…
Read More »