You searched for network access control/ | SC Media

Your search for network access control/ returned 11 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Doug Olenick remove

Your search for network access control/ returned 11 results

Sort Results:

Relevant Recent
Executive Insight, Opinion

Using the zero trust model to prevent phishing

By Philip James, director of architecture and integration, Alagen Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact, nearly 60 percent of email today is spam, and three-quarters of organizations say they’ve experienced…
Executive Insight, Security News

No, VPNs Aren’t Dead — They’re More Essential Than Ever

A few weeks ago, a particular SC Media Executive Insight claimed it’s time to say good-bye to VPNs. Among other things, the writer claimed that application access was more effective, and that zero trust architecture is an essential ‘alternate model’ for access. While I agree with Mr. Sullivan that application access and zero trust architecture…
Executive Insight, Opinion

VPN to world: Reports of my death are greatly exaggerated

While some in the industry are making the argument that enterprises don’t need VPNs anymore (principally vendors that don’t offer VPN solutions), nothing could be further from the truth. To mangle Mark Twain’s famous quote, press reports of the death of VPN are greatly exaggerated. VPNs remain the proven and reliable method of providing protected…
Executive Insight, Opinion

What is the Zero Trust Framework in cybersecurity and 5 considerations for building a Zero Trust IT environment

What is Zero Trust? Zero Trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not ‘verify, then trust’ but ‘never trust and always verify.’ Essentially, Zero Trust is about protecting data by limiting access to it. An…
Privacy & Compliance News and Analysis, Security News

Google faces new legal action for violating COPPA

The millions of children now taking online elementary school classes due to COVID-19 has proven to be a boon for Google, however the huge increase in usage comes at a time when the company is being sued by two entities for violating state and federal child privacy regulations for its other learning tools. This week…
Network Security, Security News

NASA takes Caltech’s JPL to task over cybersecurity issues

NASA’s Jet Propulsion Laboratory (JPL) is best known as the home for a variety of space-faring endeavors, but the facility is also tasked with defending the space agency from cyberattacks. A new report from NASA found that while JPL’s rocket scientists are doing well when it comes to handling space explorations, it found multiple security…
Executive Insight, Security News

Three common cybersecurity scenarios and tips for preventing them

It happens to the best of us. We open our laptop to browse the web or check emails when all of a sudden our computer freezes, and a message appears informing us that we’ve been hacked. Despite the amount of vigilance businesses have in regards to cyberattacks, particularly following the high profile security breaches, scenarios…
Executive Insight, Opinion

Securing Your Supply Chain: Mitigating Supplier and Contractor Risk

The rise of breaches caused by third-party vendors reached an all-time high in 2018. This has driven organizations to take a much closer look at supplier and contractor security controls, as well as risk exposure throughout the delivery supply chain. According to a survey conducted last year by the Ponemon Institute, the average organization has…
Next post in Executive Insight