Network Management

In the cloud era, connectors are reaching their breaking point. Just as they were created to address an industry pain point, a new model designed to solve the connector impasse has emerged called identity orchestration recipes.

As the floundering economy continues to hopscotch around broken supply chains and the worsening cybersecurity breakdowns, businesses and analysts alike are sharpening their focus on what lies ahead. TechNewsWorld spoke with IT executives to gather predictions for what 2023 holds.

Cloudflare's Zero Trust SIM is designed to secure every packet of data leaving a mobile device. After it’s installed, the ZT SIM sends network traffic from the device to Cloudflare’s cloud where its Zero Trust security policies can be applied to the data.

Nearly all the top 10 universities in the United States, United Kingdom, and Australia are putting their students, faculty and staff at risk of email compromise by failing to block attackers from spoofing the schools’ email domains.

Companies have a long road ahead to protect privileged identities and access, despite corporate leaders’ good intentions. Less than half of the organizations surveyed by Delinea have implemented ongoing security policies and processes for privileged access management.

Scalable cloud-based solutions are widely popular among IT pros these days. The cost, convenience, and reliability of ready-to-use software as a service make this disruptive technology a favorable choice. Still, Paul Evans, CEO at Redstor, a data management provider headquartered in the U.K., sugges...

Ransomware is the top supply chain risk facing organizations today, according to a new survey by ISACA, an association for IT professionals with 140,000 members in 180 countries. The survey, based on responses from more than 1,300 IT pros with supply chain insights, found that 73% of the respondents...

Without a detailed accounting of open-source code running within their software, companies have no way to monitor software policies, licenses, vulnerabilities, and versions. That means IT departments are clueless about the overall health of the open-source components they use.

Cloud storage provider Nasuni recently announced a $60 million equity investment by new investor Sixth Street Growth. This is the fourth round of financing for Nasuni over the last five years, during which it has raised a total of $148 million. We spoke with the company's founder and CTO Andres Rodr...

The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.

Under the new Critical Infrastructure Defense Project, companies in particularly vulnerable industries -- such as hospitals and water and power utilities -- will have access to the full suite of Cloudflare's Zero Trust solution, CrowdStrike's endpoint protection and intelligence services, and Ping I...

Remote workers have higher anxiety levels about security and privacy than other types of employees. In a survey of 7,200 people from nine countries, more than two-thirds of remote workers acknowledged they worried about security and privacy, even when nothing was wrong.

Growing use of unified communication and collaboration tools in organizations could hurt productivity in the short term, according to a study released last week by a service assurance and cybersecurity company. In a survey commissioned by Netscout, of Westford, Mass., more than nine in 10 of the 30...

New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...

Technewsworld Channels