remote access - Tagged - Security Boulevard
SASE network Palo Alto Networks HashiCorp

HashiCorp Launches Open Source Identity Framework

HashiCorp, at its HashiConf Digital conference today, announced an open source Boundary project that will enable users to remotely access systems regardless of location based on their specific identity. At the same ...
Security Boulevard
The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next - Part 1

Pulse Secure Joins Forces with Ivanti Alongside MobileIron

I am pleased to announce that Pulse Secure has signed a definitive agreement to be acquired by Ivanti, a leading provider of enterprise-grade, intelligent IT management and security software solutions. Ivanti is ...
PPG’s Remote Access Success Story: Ramping Up to a Full Remote Workforce During a Global Pandemic

PPG’s Remote Access Success Story: Ramping Up to a Full Remote Workforce During a Global Pandemic

As this year comes to an end, it’s important for businesses to evaluate the impact COVID-19 has had on secure remote access, the shift to mobile workforces, and business continuity strategies. There ...
CISO Perspectives: Zero Trust, Secure Access, and What’s Next — Hearing the Zero Trust Signal through the Zero Trust Noise

CISO Perspectives: Zero Trust, Secure Access, and What’s Next — Hearing the Zero Trust Signal through the Zero Trust Noise

Cyber Security Hub’s Editor-in-Chief Seth Adler took some time to speak with Mike Riemer, Global Chief Security Architect, Pulse Secure, and Tom Mustac, Senior Director Biomedical Cybersecurity at Mount Sinai Health System, ...
The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next - Part 1

The Age of Any Access—Zero Trust Evolution, Trends, and What’s Next

Beginning back in March, organizations around the globe were faced with the unprecedented task of ramping up their resources to securely connect and navigate a continuously increasing threat landscape and evolving perimeter ...
Logix CISO on remote workforce security strategies

How Remote Work is Reshuffling Your Security Priorities and Investments

Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to... The post How Remote Work is Reshuffling Your Security Priorities and Investments ...

Secure Remote Access: Why It’s Important and How to Do It Right

COVID-19 forced organizations all over the world to transition their employees to a work-from-home policy. That change came at a time when organizations’ connected infrastructure is more complex than ever. Such complexity ...

Is Your Short-Term Remote Workforce Technology in for the Long-Haul?

The dynamic, distributed workforce is not a passing phase. It is here to say. Thus, it?s time to consider what is required for best-in-class security in this new reality of working from ...

Mitigating Threats Associated with Downloading Files in Native File Format

File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as ...
brute-force

Remote Work Pushes Brute-Force Attacks Higher

The widespread switch to work-from-home arrangements around the globe means employees are working offsite at unprecedented levels. It’s also prompted cybercriminals to find additional targets to exploit. We have heard for months ...
Security Boulevard