Zero Trust promotes the concept that organizations should not trust any entity inside or outside their network perimeters in a predetermined fashion. Adoption of the Zero Trust security model is picking up steam at last. In February 2020 – before the pandemic swept the world – a survey of more than 400 IT security decision makers conducted … More What is the Zero Trust security model, and why is its adoption growing?
If we can’t secure the supply chain, eventually everything else will break. Recent events have illustrated the need for robust continuity plans, and while these events are still unfolding, it also brings to light the need for robust supply chain planning. A review of the r/sysadmin group on Reddit reveals comments from systems administrators that their orders … More What happens when the global supply chain breaks?
No one has a road map for securing a connected city – but there should be a whole atlas of such maps. Here at CES, Toyota just announced plans to build a 175 acre (70 hectare) playground in Japan to test connected cities, complete with cars, buildings and real residents willing to be something of ongoing … More CES – Taking a smart city for a test drive
ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk. Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving … More Defending your company from cyberattack
WeLiveSecurity sat down with David Harley to get a better understanding of Critical Infrastructure and the role he has played in the area throughout his career. [Editor] How did you come to be involved with Critical Infrastructure? [David Harley] I first took an interest in Critical Infrastructure (CI) when I started working on the security side … More Critical Infrastructure Interview with cyber-expert David Harley