Security Archives | CIO Insight The Voice of the CIO Community
- Storage Vulnerabilities: The Neglected Cybersecurity Frontierby Drew Robb on September 7, 2022 at 3:45 pm
A 2021 study by Continuity details the fact that lack of storage security is putting a great many organizations at risk. Based on an analysis of more than 400 high-end storage devices, over 6,000 discrete vulnerabilities, misconfigurations, and other security issues were detected.Ā āOn average, an enterprise storage device has around 15 security vulnerabilities, out The post Storage Vulnerabilities: The Neglected Cybersecurity Frontier appeared first on CIO Insight.
- NGFW vs UTM: Differences & Use Casesby Don Hall on August 12, 2022 at 9:54 pm
Next-generation firewalls (NGFWs) and unified threat management (UTM) systems are two of the most popular network security tools on the market today. They achieve similar goals in defending against cyberattacks, but the way each type of product approaches that task is different. Understanding the core differences between NGFWs and UTM systems is essential to building The post NGFW vs UTM: Differences & Use Cases appeared first on CIO Insight.
- Top Next-Generation Firewall (NGFW) Softwareby Jenna Phipps on July 19, 2022 at 9:04 pm
Next-generation firewalls provide enterprise security for businesses that see frequent malicious traffic and advanced efforts to breach networks and systems. The top NGFW providers have powerful tools for threat detection and prevention, traffic analysis, and policy management. These allow admins to determine how they want to configure their enterpriseās network security. Top Next-Generation Firewall (NGFW) The post Top Next-Generation Firewall (NGFW) Software appeared first on CIO Insight.
- Perimeter 81 vs NordLayer: Network Security Comparisonby Devin Partida on June 24, 2022 at 11:01 pm
Network security is becoming increasingly important to businesses today. Cybercrime is expected to cost the global economy $10.5 trillion annually by 2025, causing business leaders to feel the pressure to prevent rather than react.Ā Consequently, choosing the right security solution is critical to a companyās success, and for many, that means choosing between Perimeter 81 The post Perimeter 81 vs NordLayer: Network Security Comparison appeared first on CIO Insight.
- 5 Tips For Fostering Enterprise Network Securityby Shannon Flynn on June 15, 2022 at 6:25 pm
Cybersecurity has become a major topic of discussion in the business world. The rising frequency of cyberattacksācombined with several high-profile breaches in the past few yearsāhas put the spotlight on the impact a successful attack can have. Despite growing awareness, many businesses still donāt have basic cybersecurity policies in place, putting them at greater risk The post 5 Tips For Fostering Enterprise Network Security appeared first on CIO Insight.
- Deepfake Awareness Riding on Top Gunās CoattailsĀ by Drew Robb on June 2, 2022 at 5:50 pm
AI-powered deepfake technology has advanced markedly in recent years. It has been used successfully to simulate real-world likenesses in audio and video clips, and now it has made its way to the cinema.Ā The release of Top Gun: Maverick in late May 2022 heralded Val Kilmer reprising his famous role as Adm. Tom āIcemanā Kazansky. The post Deepfake Awareness Riding on Top Gunās CoattailsĀ appeared first on CIO Insight.
- Moving Beyond Cybersecurity to Cyber Resilienceby CIO Insight Staff on May 18, 2022 at 3:40 pm
Guest Contributor: Jorge Rey, CISA, CSIM In the first year of the pandemic, hackers shattered records for data lost in cyber attacks. And from October 2020 through February 2021, eCrime rose by 124 percent, according to the eCrime Index created by endpoint security company CrowdStrike Holdings.Ā More sophisticated threats, increased frequency of attacks, the growing The post Moving Beyond Cybersecurity to Cyber Resilience appeared first on CIO Insight.
- Is ERP software a security risk?by Madeline Clarke on April 30, 2022 at 5:16 pm
Enterprise resource planning (ERP) software allows you to organize and manage practically every resource and operation within your working structure. Unfortunately, while this can make work easier for your teams, it can also provide cybercriminals with easy access to your most important data. To avoid a worst-case scenario, itās important to understand the most common The post Is ERP software a security risk? appeared first on CIO Insight.
- Best Identity and Access Management (IAM) Software 2022by Jenna Phipps on April 26, 2022 at 12:00 pm
Identity and access management tools play a critical role in an enterpriseās security infrastructure, requiring users to pass authentication tests for each session. IAM solutions allow organizations to manage all network users and set policies to control their access to sensitive applications. For enterprises seeking to tighten access to applications, particularly those with important data, The post Best Identity and Access Management (IAM) Software 2022 appeared first on CIO Insight.
- Four Types of Ransomware You Should Knowby Jenna Phipps on March 25, 2022 at 5:01 pm
Ransomware threatens enterprise networks, devices, finances, and reputations. This type of malware demands that the victim pay a specified ransom to regain access to their computer systems or files. Ransomware also takes different forms, some more difficult to recover from than others.Ā Although ransomware is one of the most sinuous and devastating cyber attacks, there The post Four Types of Ransomware You Should Know appeared first on CIO Insight.