Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The evolution of Zero Trust with AT&T: the ZTNA 2.0 advantage

This blog was jointly written with Kumar Ramachandran, Senior Vice President, Palo Alto Networks Most people can recall a time when computers were pieces of equipment that remained in a fixed location. Because of this, security was less of an issue outside of an organization's own walls. That all changed when laptop computers and mobile devices ushered in the era of the mobile workforce.

Is deliberate exfiltration or human error the bigger outbound threat?

Outbound threats cause a continuous headache for IT professionals. There’s so much variety in type and risk level, and prioritizing what to be most concerned about is a challenge. Plus, risks have ramped up in recent years due to the rise in home working, flexible working, and BYOD, making the landscape more complex. It’s easy to be concerned about whether you have the right tools in place to deal with the multitude of cybersecurity risks out there.

Mentoring in cybersecurity | Cybersecurity Sessions #10 with Gabrielle Botbol

Mentoring is essential to closing the cybersecurity skills gap, especially in realizing the potential of people from underrepresented communities. In recent years many newcomers to cyber have been mentored by Gabrielle Botbol. Since teaching herself how to be a pentester, she has become recognized as one of Canada’s top 20 women in cybersecurity. Andy Still finds out how Gabrielle entered the world of cybersecurity after leaving another vocation, and how she is helping the next generation of women and underrepresented communities follow her ‘six steps to becoming a pentester’.

Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

With the introduction of various compliance requirements such as HIPAA, PCI and GDPR (just to name a few from around the world), there is an increasing need for organizations to determine where their sensitive data is located, secure access to it and protect it accordingly. There are many products that incorporate the ability to Discover and Classify data. NC Protect is no different.

Skill Gaming in India: How Identify Verification is the solution for new regulations

India’s online gaming industry has witnessed an unprecedented rise even before the pandemic. It is in the world’s top five mobile gaming markets. However, COVID-19 and the following lockdowns saw significant growth in online gaming in India. By September 2020, almost 17% of worldwide downloads, with 7.3 billion installed games in September 2020. India has 400+ online gaming market players and is home to 420 million online gamers, second only to China.

Introducing Devo Connect, Your New Online Community

For many people, cybersecurity is merely a necessary business function. But that’s not how our customers see it. For you, cybersecurity is an ever-escalating arms race involving sophisticated operators and uncounted moving parts where a single mistake can cause an avalanche of problems. Cybersecurity isn’t just your job, it’s your life. You are on the front lines, responsible for protecting your organization in a high-pressure environment every day.

Trustwave Named Innovation Leader in Frost & Sullivan's Frost Radar Global Managed Detection and Response Market

Frost & Sullivan analysts investigated 70 market participants and recognized Trustwave as one of 15 Innovators in the field. The report noted that Trustwave’s Fusion platform allows clients to manage and view their cybersecurity status, and elite SpiderLabs are driving factors behind being honored. “Trustwave Fusion, a security operations platform that integrates and enriches data from over 750 third-party sources, including cloud, network, endpoints, and email.