security policies
Unisys Adds Visualization Tools to Stealth Platform
Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time ...
Security Boulevard
DEF CON 28 Safe Mode Voting Village Village -Jody Westby’s ‘Policy Approach To Resolving Cybersecurity Problems’
Marc Handelman | | Conferences, DEF CON, education, Election Security, Information Security, security policies, Voting Security, Voting Village
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel ...
IT Relaxing Security Policies During WFH While Employees Step Up Their Efforts
IT workers may have had the toughest transition to the WFH model. Not only were they tasked with preparing entire organizations for remote work, setting them up with the right equipment and ...
Security Boulevard
Security and Visibility When Users Are Not in the Office
Mehul Patel | | cloud-delivered security, DLP, HTTPS, HTTS, Phishing, Secure Web Gateway, security, security policies, SSL Inspection, URL filtering, visibility and control, VPN
Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If ...
Discussing AppSec Policies within DevSecOps
Stephen Gates | | Application Security Vulnerabilities, AppSec Program, Automating Security Testing, Blog, developers, security policies, Technical Blog
There’s no denying that today’s digital ecosystem must be protected. But preventing increasingly frequent and severe attacks, which often target customer data and confidential information, requires more out of your organization’s security ...
Transforming Security Through Zero Trust
You may have heard the phrase “zero trust” being thrown around quite a bit lately. While it may sound dystopian, zero trust is, I believe, a framework that embodies not only a ...
Security Boulevard
Tufin Unifies Management of Cloud Cybersecurity Policies
Michael Vizard | | Best Practices, Cloud Security, DevSecOps, security orchestration, security policies
Tufin today announced the availability of Tufin SecureCloud, which combines two existing offerings to manage cybersecurity policies for both monolithic applications and emerging microservices-based application environments. Company CTO Reuven Harrison said rather ...
Security Boulevard
Security Strategy: Moving Away From Tried and True
Michael Schenck | | cyber-risk, security checklist, Security Framework, security policies, security tactics
Many security professionals in developing their strategy still fall back on the old punch list approach to security configurations. They believe that if they check the box on tried and true methods ...
Security Boulevard
Rapid Cloud Adoption Introduces Security Risks
Lior Cohen | | Cloud, cloud heterogeneity, cloud platforms, Cloud Security, multi-cloud, private cloud, Public cloud, security policies
Organizations that store data, use applications and run workflows across multiple public cloud platforms create a serious challenge for security architects. Establishing and maintaining a consistent security posture for an organization that ...
Security Boulevard
Cybersecurity: Chernobyl and its Cyber Lessons
Simon Lacey | | cyberthreat, Security Awareness, security policies, security posture, Security Training
Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident ...
Security Boulevard

