Unisys

Unisys Adds Visualization Tools to Stealth Platform

Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time ...
Security Boulevard

DEF CON 28 Safe Mode Voting Village Village -Jody Westby’s ‘Policy Approach To Resolving Cybersecurity Problems’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel ...
IT

IT Relaxing Security Policies During WFH While Employees Step Up Their Efforts

IT workers may have had the toughest transition to the WFH model. Not only were they tasked with preparing entire organizations for remote work, setting them up with the right equipment and ...
Security Boulevard

Security and Visibility When Users Are Not in the Office

Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If ...
Discussing AppSec Policies within DevSecOps

Discussing AppSec Policies within DevSecOps

There’s no denying that today’s digital ecosystem must be protected. But preventing increasingly frequent and severe attacks, which often target customer data and confidential information, requires more out of your organization’s security ...
zero trust

Transforming Security Through Zero Trust

You may have heard the phrase “zero trust” being thrown around quite a bit lately. While it may sound dystopian, zero trust is, I believe, a framework that embodies not only a ...
Security Boulevard
cloud security

Tufin Unifies Management of Cloud Cybersecurity Policies

Tufin today announced the availability of Tufin SecureCloud, which combines two existing offerings to manage cybersecurity policies for both monolithic applications and emerging microservices-based application environments. Company CTO Reuven Harrison said rather ...
Security Boulevard
security strategy

Security Strategy: Moving Away From Tried and True

Many security professionals in developing their strategy still fall back on the old punch list approach to security configurations. They believe that if they check the box on tried and true methods ...
Security Boulevard
data classification

Rapid Cloud Adoption Introduces Security Risks

Organizations that store data, use applications and run workflows across multiple public cloud platforms create a serious challenge for security architects. Establishing and maintaining a consistent security posture for an organization that ...
Security Boulevard
cybersecurity

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident ...
Security Boulevard