article thumbnail

An expanded attack surface: The cybersecurity challenges of managing a hybrid workforce

CIO

At a recent CIO New Zealand roundtable event in Auckland, supported by Palo Alto Networks and Vodafone New Zealand, senior technology executives from organisations across Aotearoa discussed the challenge of keeping security front of mind when the workforce is dispersed. The other key aspect is implementing zero trust networking.

Malware 268
article thumbnail

Safeguarding SMEs: GenAI, Cybersecurity, and IP Protection Challenges

Trigent

Yet, this formidable technology also brings forth risks requiring attention, particularly in cybersecurity and Intellectual Property (IP) rights. One is a glaring lack of basic cybersecurity measures, and two, given the low-risk and high-reward nature, cyber criminals target these businesses more often than large enterprises.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Cloud Security Influences IoT Security

Xebia

I keep on finding security issues at IoT vendors cloud services, and that saddens me. That is why I joined Xebia to learn more about cloud security and help IoT vendors to fix security issues with their cloud infrastructure. The default security of our IoT devices are improving. A typical IoT device network.

IoT 130
article thumbnail

How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens

Tenable

What can we do to further harden the cybersecurity of power plants, fuel pipelines, water treatment plants and similar facilities? . As someone who worked as an ICS engineer – tasked with building, maintaining and troubleshooting industrial control systems – before specializing in OT cybersecurity, the issue is near and dear to my heart.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO

In the fast-evolving world of finance, data security is of paramount importance. Financial institutions must ensure the protection of sensitive personal information, most commonly payment card data, to maintain, trust and meet various regulatory requirements. This is where a Common Controls Assessment (CCA) can play a pivotal role.

article thumbnail

Enterprise Application Security: What It Is and How To Prevent It?

Openxcell

Enterprise application security is one of the most important aspects of protecting organizations from external attacks. Over the years, cybersecurity vulnerability reports have recorded an increase in the number of security holes in enterprise applications. What is Enterprise Application Security?

article thumbnail

Heightened cyber threats have everyone on edge, what do you need to know?

Lacework

It’s the issue with Okta that has the security community abuzz. It’s a key part of many companies’ security strategies, and is trusted with a lot of sensitive access for a wide range of companies, and for good reason. Services like this greatly simplify identity and authentication challenges. Security isn’t a binary state.