Innovate securely with Azure

This blog post has been co-authored by Carissa Broadbent, Product Marketing Manager, Security Marketing. Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we’ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft.

Continue reading

Cybersecurity executive order 2021 pushes IoT security

President Biden’s recent executive order on cybersecurity garnered attention for its broad efforts to boost the nation’s overall security posture, but it also includes calls to action intended to improve IoT defenses. The White House issued the May 12 order following a ransomware against Colonial Pipeline that shut down fuel distribution along the East Coast, leading to local gas shortages and disrupting U.S. economic activity.

Continue reading

Defending against ransomware is all about the basics

The concept behind ransomware is simple. An attacker plants malware on your system that encrypts all the files, making your system useless, then offers to sell you the key you need to decrypt the files. Payment is usually in bitcoin (BTC), and the decryption key is deleted if you don’t pay within a certain period.

Continue reading

4 zero-trust IoT steps to scale security

The zero-trust security model, built upon the idea “never trust, always verify,” offers an ideal framework for IoT because it requires IT security teams to continually review, revise and make changes as the network changes. Zero trust offers a more efficient and scalable security strategy for IoT.

Continue reading

Better protect your web apps and APIs against threats and fraud with Google Cloud

With web applications and public APIs becoming increasingly important to how organizations interface with their customers and partners, many are turning to dedicated tools that can help protect these assets. As research firm Gartner notes in its 2020 report “Defining Cloud Web Application and API Protection Services,” “By 2023, more than 30% of public-facing web applications will be protected by cloud web application and API protection (WAAP) services that combine DDoS protection, bot mitigation, API protection and web application firewalls (WAFs).

Continue reading

Critical security risks to IoT on cellular networks and how to handle them: A guide

If you take any risk when it comes to data, you need the CIA. The CIA, in this instance, is the ‘confidentiality, integrity and availability’ of that data. As such, IoT data transmission needs to be assessed for these risks. Cellular networks have long been considered a walled garden – a safe way to gain remote connectivity for your IoT devices.

Continue reading

Securing small and medium-size enterprises: What’s next?

Give cybercriminals this much: they are opportunistic. When the COVID-19 outbreak led to government-ordered shutdowns in early 2020, almost overnight thousands of organizations around the world became entirely remote. But while many businesses had some experience with mobility and flexible work-from-home arrangements, few were set up to operate 100 percent remotely.

Continue reading

How to reap the benefits of going cloud-native without compromising cybersecurity

Cloud-native applications are part of tech’s ‘new normal’ – designed specifically for the cloud, to drive the speed, efficiency and scalability which is transforming the way we work. The Covid-19 pandemic has accelerated cloud adoption, giving global businesses the flexibility to respond to changing priorities and a distributed workforce.

Continue reading

1 4 5 6 7 8