You searched for network access control/ | SC Media

Your search for network access control/ returned 17 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove

Your search for network access control/ returned 17 results

Sort Results:

Relevant Recent
Group Test

Policy management

To ensure compliance with regulations and best practices, two groups of solutions either help manage workstations/servers or help manage network devices, says Nathan Ouellette.
Executive Insight, Opinion

Using the zero trust model to prevent phishing

By Philip James, director of architecture and integration, Alagen Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact, nearly 60 percent of email today is spam, and three-quarters of organizations say they’ve experienced…
Executive Insight, Security News

No, VPNs Aren’t Dead — They’re More Essential Than Ever

A few weeks ago, a particular SC Media Executive Insight claimed it’s time to say good-bye to VPNs. Among other things, the writer claimed that application access was more effective, and that zero trust architecture is an essential ‘alternate model’ for access. While I agree with Mr. Sullivan that application access and zero trust architecture…
Executive Insight, Opinion

VPN to world: Reports of my death are greatly exaggerated

While some in the industry are making the argument that enterprises don’t need VPNs anymore (principally vendors that don’t offer VPN solutions), nothing could be further from the truth. To mangle Mark Twain’s famous quote, press reports of the death of VPN are greatly exaggerated. VPNs remain the proven and reliable method of providing protected…

Lock down home workers with a mix of tech tools and policies

Security pros face unending attacks and challenges as they try to maintain business continuity while employees work-from-home. Now that the majority of the staff works beyond the network perimeter, the escalating threats are real, driving opportunistic threat actors to ramp up their phishing efforts. For example, Google found earlier this year that 18 million phishing…
Executive Insight, Opinion

What is the Zero Trust Framework in cybersecurity and 5 considerations for building a Zero Trust IT environment

What is Zero Trust? Zero Trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not ‘verify, then trust’ but ‘never trust and always verify.’ Essentially, Zero Trust is about protecting data by limiting access to it. An…

Cure worse than disease? Patching riskier under COVID-19 work-from-home policies

Patch management was challenging enough before the world was upended by a rapidly spreading pandemic. But with security teams working remotely, and employee-operated devices dispersed across large distances, quickly prioritizing and fixing critical vulnerabilities has become both more difficult and more important. As the 2017 Equifax breach showed, delays in patching can result in a…
Data Breach, Health Care, Legal, Security News

Premera Blue Cross to cough up $10 million to 30 states over data breach

Premera Blue Cross has consented to pay $10 million as compensation for a nearly year-long data breach that impacted more than 10.4 million health patients, the Washington state’s Attorney General Bob Ferguson announced yesterday. More than half of those funds, roughly $5.4 million, will be allocated to Washington, and will be applied toward the enforcement…
Next post in Legal