Access Management Resolution in the Digital Era

There seems to be continuing confusion about what access management means. In layman’s terms, accessing an application implies the process of authentication — i.e., opening a browser or accessing a link — where you may be prompted to enter your credentials. If the user provides the right set of credentials, he or she gains access…

Cloud Governance Fails Could Trigger Privacy Compliance Issues: Report

On average, an enterprise now uses 1,427 cloud services. Seventy-one percent of these are enterprise services, with the remainder being consumer services. The average employee actively uses 36 cloud services, including nine collaboration services, six file sharing services, and five content sharing services (such as YouTube). These figures come from an analysis of 30 million…

Microsoft Launches Security Program For Azure IoT

Microsoft has launched a new program for its Azure cloud platform to help business customers strengthen their security posture amid the rise of the Internet of Things. Security and privacy concerns are top of mind for IT pros as the IoT continues to grow within the enterprise. Many struggle to verify the security of their…

Enabling the Industrial Internet of Things with Unidirectional CloudConnect

Waterfall Security Solutions launched Unidirectional CloudConnect, a solution based on its patented Unidirectional Gateway technology, designed to meet the challenges of both cybersecurity and interoperability. “Waterfall’s Unidirectional CloudConnect is an essential enabler for the Industrial Internet of Things. CloudConnect secures industrial sites from cyberattacks from the cloud and the Internet, while delivering seamless interoperability of…

Cybersecurity Industry Outlook: 2017 to 2021

In 2004, the global cybersecurity market was worth $3.5 billion — and by 2017 it will be worth at least 35X that amount, according to numerous estimates from market researchers and analysts. Cybersecurity is one of the fastest growing and largest technology sectors. Four predictions from Cybersecurity Ventures frame the cybersecurity economy over the next…

Why you need to develop an immersive security strategy

Security solutions today are inadequate in part because they do not provide a truly effective experience for consuming security data and analyzing and responding to threats. In this evolving threat landscape, businesses will need to utilize intuitiveness and situational awareness to enable security professionals to really “experience” the data and become more efficient and strategic….