article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 191
article thumbnail

Is ad fraud a cybersecurity problem?

The Parallax

Should chief information security officers at companies hit by ad fraud take a stronger role in stopping it? In a 2016 analysis, Hewlett Packard Enterprise identified it as the most lucrative form of cybercrime. Fraudsters do that by stealing traffic logs to mimic them, and creating authentic-looking but fake traffic.

Security 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming. With that perspective, you might find it hard to believe that hackers, security researchers, and other cybersecurity experts have much to be thankful for, or to look forward to.

Trends 189
article thumbnail

Smallstep takes big step toward authenticating machine-to-machine communications

TechCrunch

The central issue is that when there are no humans involved, how do you authenticate the hand-off between machines to ensure it’s going to the right place? The company launched in 2016 and launched their first open source product a couple of years ago. “Fundamentally, identity in distributed systems is an unsolved problem.

article thumbnail

Is ad fraud a cybersecurity problem?

The Parallax

Should chief information security officers at companies hit by ad fraud take a stronger role in stopping it? In a 2016 analysis, Hewlett Packard Enterprise identified it as the most lucrative form of cybercrime. Fraudsters do that by stealing traffic logs to mimic them, and creating authentic-looking but fake traffic.

Security 130
article thumbnail

What a quarter century of digital transformation at PayPal looks like

CIO

If there’s a company that can boast being 100% digital native, it’s PayPal, the platform that allows companies and consumers to send and receive digital payments in a secure, comfortable and profitable way. When we talk about security, what was enough yesterday is no longer enough today,” he says. Stability is another objective.

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

That’s the bad news the Cybersecurity and Infrastructure Security Agency’s Cyber Safety Review Board delivered in a recent report. Drive best practices for security hygiene, such as automated vulnerability management, asset inventorying and vulnerability mitigation, as well as secure software development practices.