Since the start of the COVID19 pandemic, enterprises worldwide have adopted the work-from-home model. This shift has resulted in an increase in cyberattacks, and some traditional models of security are becoming ineffective as employees increasingly access resources remotely and use personal devices.
In the latest Cybersecurity Magazine article, Varin Khera argues for the use of ‘zero-trust’ security models and examines the best practices for adopting such a model.
The second article is now available of our two-part series looking at the security challenges faced by when using hybrid and multi cloud implementations
Tom Madsen now examines how some of the risks can be mitigated and how to reduce the complexity of typical hybrid and multi cloud implementations.
The latest article from Cybersecurity Magazine is the first in a two-part series looking at the challenges faced by cybersecurity professionals when clients are using multiple clouds as well as local infrastructure to run their business.
In this first article, Tom Madsen focusses on the various challenges in this environment.
Today is the first-ever Identity Management Day, created to raise awareness, educate and engage business leaders and IT decision makers on cyber security and identity management.
Anurag Kahol, Bitglass, Art Gilliland, Centrify, Ralph Pisani, Exabeam, and Gary Cheetham, CISO at Content Guru, give their insights into why this day was created and what businesses can do to evolve their security landscape and protect their organisation.